-
Notifications
You must be signed in to change notification settings - Fork 1
/
link_map.json
1539 lines (1539 loc) · 200 KB
/
link_map.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
[
{"name":"cpj.org/2019/07/digital-safety-kit-journalists","size":100,"imports":["www.virustotal.com/gui/home/url","docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview","support.apple.com/en-gb/HT204837","www.veracrypt.fr/en/Downloads.html","gpgtools.org","www.gpg4win.org","www.thunderbird.net/en-GB","addons.thunderbird.net/en-US/thunderbird/addon/enigmail","www.mailvelope.com/en","www.eff.org/https-everywhere","www.eff.org/privacybadger"]},
{"name":"www.virustotal.com/gui/home/url","size":100,"imports":[]},
{"name":"docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview","size":100,"imports":[]},
{"name":"support.apple.com/en-gb/HT204837","size":100,"imports":[]},
{"name":"www.veracrypt.fr/en/Downloads.html","size":100,"imports":[]},
{"name":"gpgtools.org","size":100,"imports":[]},
{"name":"www.gpg4win.org","size":100,"imports":[]},
{"name":"www.thunderbird.net/en-GB","size":100,"imports":[]},
{"name":"addons.thunderbird.net/en-US/thunderbird/addon/enigmail","size":100,"imports":[]},
{"name":"www.mailvelope.com/en","size":100,"imports":[]},
{"name":"www.eff.org/https-everywhere","size":100,"imports":[]},
{"name":"www.eff.org/privacybadger","size":100,"imports":[]},
{"name":"ssd.eff.org/en/playlist/journalist-move","size":100,"imports":["wire.com","securityinabox.org/en/guide/jitsi/linux","securityinabox.org/en/guide/jitsi/windows","securityinabox.org/en/guide/jitsi/os-x","en.wikipedia.org/wiki/Linux_distribution","www.veracrypt.fr/en/Home.html","www.torproject.org/index.html.en","people.ischool.berkeley.edu/~nick/aaronson-oracle","support.google.com/accounts/answer/1066447?hl=en","authy.com","tools.ietf.org/html/rfc6238","proxy.org","thatoneprivacysite.net","freedom.press/training/choosing-a-vpn","cdt.org/blog/techsplanations-part-5-virtual-private-networks","cdt.org/insight/tech-explained-the-glossary/#isp","en.wikipedia.org/wiki/Mutual_legal_assistance_treaty","en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol","thatoneprivacysite.net/simple-vpn-comparison-chart","support.apple.com/en-us/ht204837","en.wikipedia.org/wiki/Hard_disk_drive","arstechnica.com/security/2011/03/ask-ars-how-can-i-safely-erase-the-data-from-my-ssd-drive","www.macworld.com/article/3005796/operating-systems/how-to-replace-secure-empty-trash-in-os-x-el-capitan.html","apple.stackexchange.com/questions/252098/srm-gone-in-macos-sierra-10-12","help.libreoffice.org/Common/Saving_Documents_Automatically","dban.org","www.lifewire.com/how-to-erase-a-hard-drive-using-dban-2619148","en.wikipedia.org/wiki/Wear_leveling","www.bleachbit.org/download/windows","docs.bleachbit.org/doc/shred-files-and-wipe-disks.html","www.bleachbit.org/download/linux","source.android.com/security/encryption/full-disk.html","www.apple.com/business/docs/iOS_Security_Guide.pdf","en.wikipedia.org/wiki/Brute-force_attack","www.theiphonewiki.com/wiki/Secure_Enclave","whispersystems.org/bigbrother/eastern-virginia-grand-jury","en.wikipedia.org/wiki/Prepay_mobile_phone","support.apple.com/en-us/HT203033","play.google.com/store/apps/details?id=org.witness.sscphase1&hl=en","everestpipkin.github.io/image-scrubber","vigilantsolutions.com","www.mvtrac.com/alpr","www.techdirt.com/articles/20151016/06220432555/license-plate-reader-companies-lose-case-seeking-to-have-anti-alpr-law-declared-unconstitutional.shtml"]},
{"name":"wire.com","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/jitsi/linux","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/jitsi/windows","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/jitsi/os-x","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Linux_distribution","size":100,"imports":[]},
{"name":"www.veracrypt.fr/en/Home.html","size":100,"imports":[]},
{"name":"www.torproject.org/index.html.en","size":100,"imports":[]},
{"name":"people.ischool.berkeley.edu/~nick/aaronson-oracle","size":100,"imports":[]},
{"name":"support.google.com/accounts/answer/1066447?hl=en","size":100,"imports":[]},
{"name":"authy.com","size":100,"imports":[]},
{"name":"tools.ietf.org/html/rfc6238","size":100,"imports":[]},
{"name":"proxy.org","size":100,"imports":[]},
{"name":"thatoneprivacysite.net","size":100,"imports":[]},
{"name":"freedom.press/training/choosing-a-vpn","size":100,"imports":[]},
{"name":"cdt.org/blog/techsplanations-part-5-virtual-private-networks","size":100,"imports":[]},
{"name":"cdt.org/insight/tech-explained-the-glossary/#isp","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Mutual_legal_assistance_treaty","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol","size":100,"imports":[]},
{"name":"thatoneprivacysite.net/simple-vpn-comparison-chart","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht204837","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Hard_disk_drive","size":100,"imports":[]},
{"name":"arstechnica.com/security/2011/03/ask-ars-how-can-i-safely-erase-the-data-from-my-ssd-drive","size":100,"imports":[]},
{"name":"www.macworld.com/article/3005796/operating-systems/how-to-replace-secure-empty-trash-in-os-x-el-capitan.html","size":100,"imports":[]},
{"name":"apple.stackexchange.com/questions/252098/srm-gone-in-macos-sierra-10-12","size":100,"imports":[]},
{"name":"help.libreoffice.org/Common/Saving_Documents_Automatically","size":100,"imports":[]},
{"name":"dban.org","size":100,"imports":[]},
{"name":"www.lifewire.com/how-to-erase-a-hard-drive-using-dban-2619148","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Wear_leveling","size":100,"imports":[]},
{"name":"www.bleachbit.org/download/windows","size":100,"imports":[]},
{"name":"docs.bleachbit.org/doc/shred-files-and-wipe-disks.html","size":100,"imports":[]},
{"name":"www.bleachbit.org/download/linux","size":100,"imports":[]},
{"name":"source.android.com/security/encryption/full-disk.html","size":100,"imports":[]},
{"name":"www.apple.com/business/docs/iOS_Security_Guide.pdf","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Brute-force_attack","size":100,"imports":[]},
{"name":"www.theiphonewiki.com/wiki/Secure_Enclave","size":100,"imports":[]},
{"name":"whispersystems.org/bigbrother/eastern-virginia-grand-jury","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Prepay_mobile_phone","size":100,"imports":[]},
{"name":"support.apple.com/en-us/HT203033","size":100,"imports":[]},
{"name":"play.google.com/store/apps/details?id=org.witness.sscphase1&hl=en","size":100,"imports":[]},
{"name":"everestpipkin.github.io/image-scrubber","size":100,"imports":[]},
{"name":"vigilantsolutions.com","size":100,"imports":[]},
{"name":"www.mvtrac.com/alpr","size":100,"imports":[]},
{"name":"www.techdirt.com/articles/20151016/06220432555/license-plate-reader-companies-lose-case-seeking-to-have-anti-alpr-law-declared-unconstitutional.shtml","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/navigating-the-internet","size":100,"imports":["www.eff.org/https-everywhere","adblockplus.org","www.eff.org/privacybadger","twitter.com/torproject"]},
{"name":"adblockplus.org","size":100,"imports":[]},
{"name":"twitter.com/torproject","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/passwords","size":100,"imports":["haveibeenpwned.com","www.eff.org/dice","www.lastpass.com","1password.com","www.commonkey.com","pixelprivacy.com/resources/reusing-passwords"]},
{"name":"haveibeenpwned.com","size":100,"imports":[]},
{"name":"www.eff.org/dice","size":100,"imports":[]},
{"name":"www.lastpass.com","size":100,"imports":[]},
{"name":"1password.com","size":100,"imports":[]},
{"name":"www.commonkey.com","size":100,"imports":[]},
{"name":"pixelprivacy.com/resources/reusing-passwords","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/email","size":100,"imports":["www.yubico.com","myaccount.google.com/signinoptions/two-step-verification/enroll-welcome?pli=1","support.microsoft.com/en-us/help/12408/microsoft-account-about-two-step-verification","help.yahoo.com/kb/SLN5013.html","www.facebook.com/help/148233965247823","help.twitter.com/en/managing-your-account/two-factor-authentication#","help.instagram.com/105448789880240/?helpref=hc_fnav&bc[0]=368390626577968&bc[1]=1757120787856285","landing.google.com/advancedprotection"]},
{"name":"www.yubico.com","size":100,"imports":[]},
{"name":"myaccount.google.com/signinoptions/two-step-verification/enroll-welcome?pli=1","size":100,"imports":[]},
{"name":"support.microsoft.com/en-us/help/12408/microsoft-account-about-two-step-verification","size":100,"imports":[]},
{"name":"help.yahoo.com/kb/SLN5013.html","size":100,"imports":[]},
{"name":"www.facebook.com/help/148233965247823","size":100,"imports":[]},
{"name":"help.twitter.com/en/managing-your-account/two-factor-authentication#","size":100,"imports":[]},
{"name":"help.instagram.com/105448789880240/?helpref=hc_fnav&bc[0]=368390626577968&bc[1]=1757120787856285","size":100,"imports":[]},
{"name":"landing.google.com/advancedprotection","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/malware","size":100,"imports":["theintercept.com/2017/11/19/how-to-protect-yourself-against-spearphishing-a-comic-explanation","ssd.eff.org/en/module/how-avoid-phishing-attacks"]},
{"name":"theintercept.com/2017/11/19/how-to-protect-yourself-against-spearphishing-a-comic-explanation","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/how-avoid-phishing-attacks","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/computers","size":100,"imports":["www.avast.com/mac","support.apple.com/kb/ph2701?locale=en_GB","docs.microsoft.com/en-us/mem/intune/remote-actions/devices-wipe","support.apple.com/en-gb/guide/icloud/mmfc0ef36f/icloud","support.google.com/accounts/answer/6160491?hl=en"]},
{"name":"www.avast.com/mac","size":100,"imports":[]},
{"name":"support.apple.com/kb/ph2701?locale=en_GB","size":100,"imports":[]},
{"name":"docs.microsoft.com/en-us/mem/intune/remote-actions/devices-wipe","size":100,"imports":[]},
{"name":"support.apple.com/en-gb/guide/icloud/mmfc0ef36f/icloud","size":100,"imports":[]},
{"name":"support.google.com/accounts/answer/6160491?hl=en","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/mobile-phones","size":100,"imports":["www.lawtechnologytoday.org/2012/06/lost-your-smartphone-time-to-remote-wipe"]},
{"name":"www.lawtechnologytoday.org/2012/06/lost-your-smartphone-time-to-remote-wipe","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/social-media-best-practice","size":100,"imports":["www.facebook.com/facebookmedia/best-practices/security_journalists","www.facebook.com/safety/tools","help.twitter.com/en/safety-and-security/account-security-tips"]},
{"name":"www.facebook.com/facebookmedia/best-practices/security_journalists","size":100,"imports":[]},
{"name":"www.facebook.com/safety/tools","size":100,"imports":[]},
{"name":"help.twitter.com/en/safety-and-security/account-security-tips","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/social-media-trolling-and-doxxing","size":100,"imports":["yoursosteam.files.wordpress.com/2017/01/tb_infographic_watermark.jpg"]},
{"name":"yoursosteam.files.wordpress.com/2017/01/tb_infographic_watermark.jpg","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/encryption","size":100,"imports":["www.signal.org","www.whatsapp.com","meet.jit.si","wire.com/en","www.matrix.org","www.mailvelope.com/en","www.mozilla.org/en-GB/thunderbird","addons.mozilla.org/en-US/thunderbird/addon/enigmail","gpgtools.org","www.gpg4win.org","spideroak.com","tresorit.com","cryptomator.org","www.veracrypt.fr/en/Home.html"]},
{"name":"www.signal.org","size":100,"imports":[]},
{"name":"www.whatsapp.com","size":100,"imports":[]},
{"name":"meet.jit.si","size":100,"imports":[]},
{"name":"wire.com/en","size":100,"imports":[]},
{"name":"www.matrix.org","size":100,"imports":[]},
{"name":"www.mozilla.org/en-GB/thunderbird","size":100,"imports":[]},
{"name":"addons.mozilla.org/en-US/thunderbird/addon/enigmail","size":100,"imports":[]},
{"name":"spideroak.com","size":100,"imports":[]},
{"name":"tresorit.com","size":100,"imports":[]},
{"name":"cryptomator.org","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/securing-your-materials","size":100,"imports":["onionshare.org","itunes.apple.com/gb/app/exif-viewer/id562827354?mt=8","addons.mozilla.org/en-US/firefox/addon/exif-viewer","chrome.google.com/webstore/detail/exif-viewer/mmbhfeiddhndihdjeganjggkmjapkffm?hl=en","support.office.com/en-gb/article/remove-hidden-data-and-personal-information-by-inspecting-documents-presentations-or-workbooks-356b7b5d-77af-44fe-a07f-9aa4d085966f?ocmsassetID=HA010354329&CorrelationId=76636d32-2f66-48c9-b66e-95d79d5e7034&ui=en-US&rs=en-GB&ad=GB","guardianproject.info/apps/obscuracam","eraser.heidi.ie","download.cnet.com/Permanent-Eraser/3000-2092_4-10668789.html"]},
{"name":"onionshare.org","size":100,"imports":[]},
{"name":"itunes.apple.com/gb/app/exif-viewer/id562827354?mt=8","size":100,"imports":[]},
{"name":"addons.mozilla.org/en-US/firefox/addon/exif-viewer","size":100,"imports":[]},
{"name":"chrome.google.com/webstore/detail/exif-viewer/mmbhfeiddhndihdjeganjggkmjapkffm?hl=en","size":100,"imports":[]},
{"name":"support.office.com/en-gb/article/remove-hidden-data-and-personal-information-by-inspecting-documents-presentations-or-workbooks-356b7b5d-77af-44fe-a07f-9aa4d085966f?ocmsassetID=HA010354329&CorrelationId=76636d32-2f66-48c9-b66e-95d79d5e7034&ui=en-US&rs=en-GB&ad=GB","size":100,"imports":[]},
{"name":"guardianproject.info/apps/obscuracam","size":100,"imports":[]},
{"name":"eraser.heidi.ie","size":100,"imports":[]},
{"name":"download.cnet.com/Permanent-Eraser/3000-2092_4-10668789.html","size":100,"imports":[]},
{"name":"rorypecktrust.org/freelance-resources/digital-security/border-crossings-and-checkpoints","size":100,"imports":["support.apple.com/kb/PH2701?locale=en_GB","support.google.com/accounts/answer/6160491?hl=en"]},
{"name":"support.apple.com/kb/PH2701?locale=en_GB","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-01-Mobile-Security-Settings.html","size":100,"imports":["motherboard.vice.com/en_us/article/mb3nd4/how-to-sext-securely-safely-what-apps-to-use-sexting","apnews.com/b031ee35d4534f548e43b7575f4ab494"]},
{"name":"motherboard.vice.com/en_us/article/mb3nd4/how-to-sext-securely-safely-what-apps-to-use-sexting","size":100,"imports":[]},
{"name":"apnews.com/b031ee35d4534f548e43b7575f4ab494","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-02-Locking-Down-Mobile.html","size":100,"imports":["theintercept.com/2017/05/01/cybersecurity-for-the-people-how-to-keep-your-chats-truly-private-with-signal/#lockdown","fieldguide.gizmodo.com/why-you-should-be-encrypting-your-devices-and-how-to-ea-1798698901","myshadow.org/train"]},
{"name":"theintercept.com/2017/05/01/cybersecurity-for-the-people-how-to-keep-your-chats-truly-private-with-signal/#lockdown","size":100,"imports":[]},
{"name":"fieldguide.gizmodo.com/why-you-should-be-encrypting-your-devices-and-how-to-ea-1798698901","size":100,"imports":[]},
{"name":"myshadow.org/train","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-03-Setting-Up-Signal.html","size":100,"imports":["medium.com/@mshelton/signal-for-beginners-c6b44f76a1f0","medium.com/@thegrugq/signal-intelligence-free-for-all-5993c2f72f90","medium.com/@mshelton/using-signal-without-giving-your-phone-number-3a575580f652","motherboard.vice.com/en_us/article/9kaxge/how-to-use-signal-without-giving-out-your-phone-number-a-gendered-security-issue","theintercept.com/2017/09/28/signal-tutorial-second-phone-number","signal.org","sec.eff.org/topics/how-to-install-signal"]},
{"name":"medium.com/@mshelton/signal-for-beginners-c6b44f76a1f0","size":100,"imports":[]},
{"name":"medium.com/@thegrugq/signal-intelligence-free-for-all-5993c2f72f90","size":100,"imports":[]},
{"name":"medium.com/@mshelton/using-signal-without-giving-your-phone-number-3a575580f652","size":100,"imports":[]},
{"name":"motherboard.vice.com/en_us/article/9kaxge/how-to-use-signal-without-giving-out-your-phone-number-a-gendered-security-issue","size":100,"imports":[]},
{"name":"theintercept.com/2017/09/28/signal-tutorial-second-phone-number","size":100,"imports":[]},
{"name":"signal.org","size":100,"imports":[]},
{"name":"sec.eff.org/topics/how-to-install-signal","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-04-Mobile-Backups.html","size":100,"imports":["www.buzzfeed.com/nicolenguyen/what-to-do-if-your-phones-storage-is-full","nextcloud.com","owncloud.com"]},
{"name":"www.buzzfeed.com/nicolenguyen/what-to-do-if-your-phones-storage-is-full","size":100,"imports":[]},
{"name":"nextcloud.com","size":100,"imports":[]},
{"name":"owncloud.com","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-05-Good-Hygiene-For-Apps.html","size":100,"imports":["etherpad.opennews.org","www.howtogeek.com/198673/secure-your-online-accounts-by-removing-third-party-app-access","www.bettercloud.com/monitor/google-account-security-complete-guide-to-connected-apps"]},
{"name":"etherpad.opennews.org","size":100,"imports":[]},
{"name":"www.howtogeek.com/198673/secure-your-online-accounts-by-removing-third-party-app-access","size":100,"imports":[]},
{"name":"www.bettercloud.com/monitor/google-account-security-complete-guide-to-connected-apps","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-06-Passwords.html","size":100,"imports":["medium.com/@mshelton/journalists-you-are-worthy-of-a-data-breach-55f8e53fd3fe","en.wikipedia.org/wiki/Cryptographic_hash_function#Password_verification","securityinabox.org/en/guide/passwords","en.wikipedia.org/wiki/Have_I_Been_Pwned%3F","medium.com/@mshelton/password-managers-for-beginners-d1f49866f80f","1password.com","keepass.info","medium.com/@mshelton/keypass-for-beginners-dc8adfcdad54","addons.mozilla.org/en-US/firefox/addon/password-exporter","haveibeenpwned.com"]},
{"name":"medium.com/@mshelton/journalists-you-are-worthy-of-a-data-breach-55f8e53fd3fe","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Cryptographic_hash_function#Password_verification","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/passwords","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Have_I_Been_Pwned%3F","size":100,"imports":[]},
{"name":"medium.com/@mshelton/password-managers-for-beginners-d1f49866f80f","size":100,"imports":[]},
{"name":"keepass.info","size":100,"imports":[]},
{"name":"medium.com/@mshelton/keypass-for-beginners-dc8adfcdad54","size":100,"imports":[]},
{"name":"addons.mozilla.org/en-US/firefox/addon/password-exporter","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-07-Two-Factor-Authentication.html","size":100,"imports":["www.eff.org/deeplinks/2016/12/12-days-2fa-how-enable-two-factor-authentication-your-online-accounts","sec.eff.org/materials/two-factor-authentication-handout-for-learners","twofactorauth.org","www.turnon2fa.com/tutorials","authy.com","support.google.com/accounts/answer/1066447?hl=en"]},
{"name":"www.eff.org/deeplinks/2016/12/12-days-2fa-how-enable-two-factor-authentication-your-online-accounts","size":100,"imports":[]},
{"name":"sec.eff.org/materials/two-factor-authentication-handout-for-learners","size":100,"imports":[]},
{"name":"twofactorauth.org","size":100,"imports":[]},
{"name":"www.turnon2fa.com/tutorials","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-08-Phishing.html","size":100,"imports":["en.wikipedia.org/wiki/Podesta_emails","en.wikipedia.org/wiki/Email_spoofing","www.sonicwall.com/phishing","freedom.press/training/email-security-tips"]},
{"name":"en.wikipedia.org/wiki/Podesta_emails","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Email_spoofing","size":100,"imports":[]},
{"name":"www.sonicwall.com/phishing","size":100,"imports":[]},
{"name":"freedom.press/training/email-security-tips","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-09-Physical-Security.html","size":100,"imports":["www.eff.org/wp/digital-privacy-us-border-2017","www.theverge.com/2017/5/23/15681990/1password-travel-mode-feature-added-security","www.eff.org/wp/digital-privacy-us-border-2017#part-2","support.apple.com/en-us/HT204837","technet.microsoft.com/en-us/library/cc731549(v=ws.10).aspx","www.apple.com/business/docs/iOS_Security_Guide.pdf"]},
{"name":"www.eff.org/wp/digital-privacy-us-border-2017","size":100,"imports":[]},
{"name":"www.theverge.com/2017/5/23/15681990/1password-travel-mode-feature-added-security","size":100,"imports":[]},
{"name":"www.eff.org/wp/digital-privacy-us-border-2017#part-2","size":100,"imports":[]},
{"name":"support.apple.com/en-us/HT204837","size":100,"imports":[]},
{"name":"technet.microsoft.com/en-us/library/cc731549(v=ws.10).aspx","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-10-ScrubbingMetadata.html","size":100,"imports":["source.opennews.org/articles/how-protect-your-sources-when-releasing-sensitive-","exifdatacom","www.digitalcitizen.life/what-file-s-metadata-and-how-edit-it","mat.boum.org"]},
{"name":"source.opennews.org/articles/how-protect-your-sources-when-releasing-sensitive-","size":100,"imports":[]},
{"name":"exifdatacom","size":100,"imports":[]},
{"name":"www.digitalcitizen.life/what-file-s-metadata-and-how-edit-it","size":100,"imports":[]},
{"name":"mat.boum.org","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-11-SecureDrop.html","size":100,"imports":["securedrop.org","www.torproject.org/about/overview.html.en","tails.boum.org","github.com/b4rton/signal-newsroom/blob/master/README","securedrop.org/directory"]},
{"name":"securedrop.org","size":100,"imports":[]},
{"name":"www.torproject.org/about/overview.html.en","size":100,"imports":[]},
{"name":"tails.boum.org","size":100,"imports":[]},
{"name":"github.com/b4rton/signal-newsroom/blob/master/README","size":100,"imports":[]},
{"name":"securedrop.org/directory","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-Overview-LoggingIn-and-Authentication.html","size":100,"imports":["docs.google.com/document/d/1q3gBvOEviV_0XMpMjvBiHSaKcl64uu4NwOoEVfXyYqU/edit#","thewirecutter.com/reviews/best-password-managers","lastpass.com/download.php","securityinabox.org/en/guide/passwords","thewirecutter.com/reviews/best-password-managers","securitytraining.opennews.org/en/latest/Chapter02-06-Passwords..html","www.yubico.com","twofactorauth.org","www.eff.org/deeplinks/2016/12/12-days-2fa-how-enable-two-factor-authentication-your-online-accounts","www.turnon2fa.com","gmail.googleblog.com/2008/03/2-hidden-ways-to-get-more-from-your.html","www.digitaltrends.com/computing/best-sites-for-creating-a-disposable-email-address","protonmail.com"]},
{"name":"docs.google.com/document/d/1q3gBvOEviV_0XMpMjvBiHSaKcl64uu4NwOoEVfXyYqU/edit#","size":100,"imports":["twofactorauth.org","source.opennews.org/articles/two-factor-authentication-newsrooms","1password.com","lastpass.com","keepassxc.org","medium.com/@mshelton/password-managers-for-beginners-d1f49866f80f","support.apple.com/en-us/HT202064","support.google.com/nexus/answer/2844831","support.apple.com/en-us/HT204837","www.pcworld.com/article/2308725/encryption/a-beginners-guide-to-bitlocker-windows-built-in-encryption-tool.html","www.torproject.org/projects/torbrowser.html.en","spideroak.comtresorit.com","cryptomator.org","signal.org","freedom.press/news/signal-beginners","ricochet.im","otr.cypherpunks.ca/help/authenticate.php","ssd.eff.org","source.opennews.org/en-US/articles/digital-self-defense-journalists-introduction","cpj.org/reports/2012/04/journalist-security-guide.php","freedom.press/anti-phishing-and-email-hygiene","source.opennews.org/guides/speaking-securely-sources","source.opennews.org/en-US/guides/defending-accounts","source.opennews.org/articles/opening-secure-channels-confidential-tips","tinfoil.press"]},
{"name":"thewirecutter.com/reviews/best-password-managers","size":100,"imports":[]},
{"name":"lastpass.com/download.php","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter02-06-Passwords..html","size":100,"imports":[]},
{"name":"www.turnon2fa.com","size":100,"imports":[]},
{"name":"gmail.googleblog.com/2008/03/2-hidden-ways-to-get-more-from-your.html","size":100,"imports":[]},
{"name":"www.digitaltrends.com/computing/best-sites-for-creating-a-disposable-email-address","size":100,"imports":[]},
{"name":"protonmail.com","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter03-01-Resources.html","size":100,"imports":["onlineharassmentfieldmanual.pen.org","sec.eff.org","ssd.eff.org","www.accessnow.org/a-first-look-at-digital-security","docs.google.com/document/d/1q3gBvOEviV_0XMpMjvBiHSaKcl64uu4NwOoEVfXyYqU/edit","thewirecutter.com/reviews/best-vpn-service","freedom.press/news/11-tips-protecting-your-privacy-and-digital-security-age-trump","hackblossom.org/cybersecurity","www.cjfe.org/journalists_in_distress_securing_your_digital_life","medium.com/cryptofriends/digital-security-training-resources-for-security-trainers-spring-2017-edition-e95d9e50065e","susanemcg.gitbooks.io/digital-security-for-journalists/content/index.html","cpj.org/reports/2012/04/technology-security.php","mshelt.onl/tinfoil.press","level-up.cc","saferjourno.internews.org/pdf/SaferJourno_Guide.pdf","rorypecktrust.org/resources/digital-security","www.tcij.org/node/1016","motherboard.vice.com/en_us/article/how-to-give-a-digital-security-training","myshadow.org/train","safetag.org/#audit","orgsec.community/display/OS","www.womensmediacenter.com/speech-project/tools-resources","holistic-security.tacticaltech.org","cpj.org/emergency-response","www.journalistsecurity.net","helpdesk.gijn.org/support/solutions/articles/14000036509-safety-and-security","dartcenter.org","www.internationalsos.com","www.controlrisks.com","www.oncallinternational.com","securityplanner.org","medium.com/@mshelton/securing-your-digital-life-like-a-normal-person-a-hasty-and-incomplete-guide-56437f127425","motherboard.vice.com/en_us/article/the-motherboard-guide-to-not-getting-hacked","secfirst.org/index.html","www.eff.org/wp/digital-privacy-us-border-2017","freedom.press/training/email-security-tips","medium.com/@mshelton/password-managers-for-beginners-d1f49866f80f","twofactorauth.org","medium.com/@mshelton/two-factor-authentication-for-newsrooms-a873060ea405","arstechnica.com/security/2016/06/aiming-for-anonymity-ars-assesses-the-state-of-vpns-in-2016","motherboard.vice.com/en_us/article/the-best-vpns-ranked","theintercept.com/2015/04/27/encrypting-laptop-like-mean","theintercept.com/2016/11/12/surveillance-self-defense-against-the-trump-administration","medium.com/the-intercept/surveillance-self-defense-for-journalists-ce627e332db6","theintercept.com/2015/11/12/edward-snowden-explains-how-to-reclaim-your-privacy","medium.com/@mshelton/signal-for-beginners-c6b44f76a1f0","theintercept.com/2017/05/01/cybersecurity-for-the-people-how-to-keep-your-chats-truly-private-with-signal","otr.im","medium.com/@thegrugq/signal-intelligence-free-for-all-5993c2f72f90","medium.com/@mshelton/upgrading-whatsapp-security-386c8ce496d3","source.opennews.org/articles/opening-secure-channels-confidential-tips","docs.securedrop.org/en/stable/index.html"]},
{"name":"onlineharassmentfieldmanual.pen.org","size":100,"imports":["1password.com","1password.com/for-journalism","99u.adobe.com/articles/25151/dont-feed-the-haters-the-confessions-of-a-former-troll","abine.com/deleteme","adaa.org","adaa.org/finding-help/treatment","adaa.org/finding-help/treatment/low-cost-treatment","amwell.com","apnews.com/ddd6ef11541649ac93ed2f2df5c56224/troll-lulz-target-online-abuse-isnt-amused","apps.apple.com/gb/app/exif-viewer/id562827354","aruljohn.com/info/howtofindipaddress","arxiv.org/abs/1702.01119","authy.com","blog.torproject.org","blog.torproject.org/solidarity-against-online-harassment","booksbywomen.org","careforyourmind.org/what-to-do-when-you-cant-afford-therapy/#more-1447","civilservant.io/moderation_experiment_r_science_rule_posting.html","coralproject.net","coralproject.net/blog/marginalized-voices-in-comment-spaces","coralproject.net/talk","cpj.org/blog/2018/03/journalists-covering-us-white-supremacists-must-we.php","crashoverridenetwork.tumblr.com","crashoverridenetwork.tumblr.com/post/113748237272/guide-talking-to-family-police","creator.zohopublic.com/jessicafj/intake-main/form-perma/Intake_Form/aBJRkvxh1h5t3RzK3VYNRXCNPuHpKZsOGgzECswDjwdXzYOpQy5GpMHfJ34JEa7jC5RyukAQkZOBuyYps8WAVswXGu60Rguw6SEG","cyberbullying.org","cyberbullying.org/bullying-laws","cyberbullying.org/resources/adults","dangerousspeech.org","dangerousspeech.org/counterspeech","datacloudoptout.oracle.com/optout","dictionary.findlaw.com/definition/true-threat.html","docs.google.com/document/d/1ud1ILFkIG0BeLX9jlzJMxCPm8-cSeqPjU60nkhUPYA8/edit","docs.securedrop.org/en/stable/journalist.html","en.support.wordpress.com/report-blogs","en.support.wordpress.com/user-guidelines","en.wordpress.com/abuse","ethics.npr.org/about-npr/688418842/special-section-social-media","evernote.com/products/webclipper","faq.whatsapp.com/android/chats/how-to-mute-or-unmute-group-notifications","faq.whatsapp.com/android/security-and-privacy/how-to-block-and-unblock-a-contact/?lang=en","faq.whatsapp.com/android/status/how-to-mute-a-contacts-status-update","faq.whatsapp.com/general/security-and-privacy/staying-safe-on-whatsapp/?lang=en","feministfrequency.com/resources","feministing.com/2013/04/02/howtobeagoodally","feministing.com/community","fortune.com/2016/07/31/bestselling-feminist-author-jessica-valenti-quits-social-media-after-rape-and-death-threats-directed-at-daughter","fpf.training/databrokers","freedom.press","gcatoolkit.org/journalists","gcatoolkit.org/journalists","gendersec.tacticaltech.org/wiki/index.php/Complete_manual","github.com/Medium/Policy/blob/master/Rules.md","github.com/OpenInternet/MyWebsiteIsDown/blob/dev/MyWebsiteIsDown.md","haveibeenpwned.com","help.instagram.com/1177797265575168?helpref=search&sr=4&query=How+do+I+remove+unwanted+photos+from+my+feed%3F","help.instagram.com/122717417885747/?helpref=hc_fnav&bc[0]=Instagram%20Help&bc[1]=Privacy%20and%20Safety%20Center&bc[2]=Report%20Something","help.instagram.com/165828726894770/?helpref=hc_fnav&bc[0]=Instagram%20Help&bc[1]=Privacy%20and%20Safety%20Center&bc[2]=Report%20Something","help.instagram.com/192435014247952","help.instagram.com/196883487377501","help.instagram.com/426700567389543","help.instagram.com/443165679053819?helpref=page_content","help.instagram.com/469042960409432?helpref=search&sr=9&query=How%20can%20I%20flag%20false%20information%20on%20Instagram%3F","help.instagram.com/477434105621119","help.instagram.com/contact/636276399721841","help.medium.com/hc/en-us/articles/217047977-Report-posts-users","help.medium.com/hc/en-us/articles/217048077-Block-user","help.medium.com/hc/en-us/articles/217048127","help.twitter.com/en/managing-your-account/understanding-the-notifications-timeline#video","help.twitter.com/en/rules-and-policies/enforcement-options","help.twitter.com/en/rules-and-policies#twitter-rules","help.twitter.com/en/safety-and-security/report-abusive-behavior","help.twitter.com/en/using-twitter/advanced-twitter-mute-options","help.twitter.com/en/using-twitter/blocking-and-unblocking-accounts","help.twitter.com/en/using-twitter/mentions-and-replies","help.twitter.com/en/using-twitter/twitter-conversations","help.twitter.com/forms","help.twitter.com/forms/abusiveuser","help.twitter.com/forms/impersonation","help.yahoo.com/kb/SLN15994.html","holistic-security.tacticaltech.org","holistic-security.tacticaltech.org/chapters/prepare/chapter-1-1-what-is-holistic-security","html.com/blog/doxing","iheartmob.org","iheartmob.org/resources/rights","iheartmob.org/resources/self_care","imageoptim.com/mac","ir.lawnet.fordham.edu/cgi/viewcontent.cgi?referer=www.google.com/&httpsredir=1&article=1002&context=clip","isapps.acxiom.com/optout/optout.aspx","ithemes.com/purchase/backupbuddy","jezebel.com/pregnant-woman-discovers-husband-is-vile-reddit-troll-w-1616741523","knowyourmeme.com/memes/i-did-it-for-the-lulz","longreads.com/2018/03/28/who-does-she-think-she-is/amp","marc.ucla.edu/mindful-meditations","medium.com/@DFRLab/human-bot-or-cyborg-41273cdb1e17","medium.com/@NoraReed/hook-bait-and-camouflage-making-a-honeybot-28a9ccfe0bed","medium.com/policy/medium-rules-30e5502c4eb4","medium.com/policy/member-content-guidelines-e81e2e345294","medium.economist.com/help-us-shape-the-future-of-comments-on-economist-com-fa86eeafb0ce","mic.com/articles/168041/trolls-keep-outsmarting-anti-harassment-tools-will-twitters-new-system-actually-work#.QWYthdX2s","mobile.va.gov/app/ptsd-coach","monitor.firefox.com","motherboard.vice.com/en_us/article/a3jkd4/the-reddit-moderator-getting-a-phd-in-online-moderation","motherboard.vice.com/en_us/article/wnj9q4/gamergate-and-sjw-bots-are-battling-on-reddit","nautil.us/issue/49/the-absurd/why-your-brain-hates-other-people","newrepublic.com/article/147276/death-civility-digital-age","news.stanford.edu/2017/02/06/stanford-research-shows-anyone-can-become-internet-troll","onlinesafety.feministfrequency.com/en","onlinesos.org/blog/i-tried-abine-delete-me-to-get-my-info-off-data-broker-websites","onlinesos.org/resources/action-center/threat-modeling","passwordsgenerator.net","philome.la/jace_harr/you-feel-like-shit-an-interactive-self-care-guide/play","privacyduck.com","psmag.com/social-justice/women-arent-welcome-internet-72170","psyberguide.org/?utm_source=ADAA","qz.com/1041042/this-woman-trolls-trolls-with-cakes","safety.google/privacy","securityplanner.consumerreports.org","signal.org","slate.com/technology/2015/12/this-brazilian-campaign-is-putting-racist-comments-on-billboards.html","slate.com/technology/2016/03/hamid-firoozi-used-google-dorking-to-find-vulnerability-in-new-york-dam-computer-network.html","slate.com/technology/2020/02/how-and-why-dox-yourself.html","splinternews.com/from-lol-to-lulz-the-evolution-of-the-internet-troll-o-1793855652","spokeo.com","ssd.eff.org","ssd.eff.org/en/module-categories/tool-guides","ssd.eff.org/en/module/creating-strong-passwords","static1.squarespace.com/static/51dc541ce4b03ebab8c5c88c/t/59ea06528dd041e0d71d8b5a/1508509266850/Sample+Documentation+Log_2014.pdf","staysafeonline.org/blog/the-importance-of-using-a-vpn","stream.aljazeera.com/story/201506031945-0024804","suicidepreventionlifeline.org","support.apple.com/en-us/HT200289","support.apple.com/en-us/HT201361","support.apple.com/guide/mail/use-rules-to-manage-your-inbox-mlhlp1017/mac","support.google.com/accounts/answer/1066447?co=GENIE.Platform%3DAndroid&hl=en","support.google.com/blogger/answer/3091837","support.google.com/blogger/answer/76315?hl=en&authuser=0","support.google.com/blogger/answer/82111","support.google.com/mail/answer/6579?hl=en","support.google.com/nexus/answer/2811098?hl=en","support.google.com/websearch/answer/4815696?hl=en","support.google.com/youtube/answer/2802027?hl=en","support.google.com/youtube/answer/2802032?hl=en","support.google.com/youtube/answer/9482361?hl=en","support.microsoft.com/en-us/help/13776/windows-use-snipping-tool-to-capture-screenshots#take-screen-capture-print-screen=windows-8","tacticaltech.org/pages/about-us","talkingpointsmemo.com/cafe/let-s-be-real-online-harassment-isn-t-virtual-for-women","time.com/4457110/internet-trolls","time.com/4457275/twitter-blocking-troll-failure","tumblr.zendesk.com/hc/en-us/articles/231877648-Blocking-users","tweetdelete.net","twitter.com/BuzzFeedNews/status/976809548936826881","twitter.com/page88/status/937690430300442625","twitter.com/pronounced_ing/status/676791342534651905","twitter.com/pronounced_ing/status/797169510289670144","twitter.com/search?src=typd&q=%23S%C4%B1rt%C4%B1m%C4%B1z%C4%B1D%C3%B6n%C3%BCyoruz","twitter.com/settings/safety","us.epsilon.com","vaultpress.com","victimsofcrime.org/our-programs/national-crime-victim-bar-association","vlaa.org/get-help/other-vlas","vlany.org","whatis.techtarget.com/definition/full-disk-encryption-FDE","whitepages.com","whois.icann.org/en","womeninjournalism.org/new-page-1","wordpress.org/plugins/better-wp-security","wordpress.org/plugins/user-blocker","wordpress.org/plugins/wordfence","www.7cups.com","www.abine.com/deleteme/landing.php","www.amazon.com/gp/help/contact-us/features-and-services.html","www.amazon.com/gp/help/customer/display.html?nodeId=201929730","www.americanbar.org/groups/lawyer_referral/resources/lawyer-referral-directory","www.amnesty.org/en/latest/research/2018/03/online-violence-against-women-chapter-1/#topanchor","www.androidcentral.com/how-take-screenshot-chromebook","www.anywho.com/whitepages","www.ap.org/assets/documents/social-media-guidelines_tcm28-9832.pdf","www.apa.org/helpcenter/online-therapy.aspx","www.authorsguild.org","www.authorsguild.org/member-services/legal-services/writers-legal-guide","www.bbc.com/news/technology-37728015","www.betterhelp.com","www.blockpartyapp.com","www.blogger.com/content.g?hl=en&bpli=1&pli=1","www.breakthrough.com","www.britannica.com/topic/First-Amendment","www.bu.edu/law/journals-archive/bulr/volume89n1/documents/CITRON.pdf","www.businessinsider.com/experiments-show-internet-trolls-are-ordinary-people-2017-3","www.calm.com","www.cbsnews.com/news/internet-shaming-when-mob-justice-goes-virtual","www.childnet.com/ufiles/Project_deSHAME_Executive_Summary.pdf","www.cloudwards.net/dashlane-vs-1password","www.computerworld.com/article/2849263/data-privacy/doxxing-defense-remove-your-personal-info-from-data-brokers.html","www.consumerreports.org/personal-information/how-to-delete-your-information-from-people-search-sites","www.crashoverridenetwork.com/index.html","www.crashoverridenetwork.com/resources.html","www.cybercivilrights.org","www.cybercivilrights.org/definitions","www.cybercivilrights.org/professionals-helping-victims","www.cybercivilrights.org/related-laws","www.cybercivilrights.org/revenge-porn-laws","www.dartmouth.edu/~healthed/relax/downloads.html","www.dashlane.com","www.drweil.com/health-wellness/body-mind-spirit/stress-anxiety/breathing-three-exercises","www.dylanmarron.com/podcast","www.exifdata.com","www.facebook.com/BindersFullofWomen","www.facebook.com/communitystandards","www.facebook.com/groups/WWWBMagazine","www.facebook.com/help/1000976436606344","www.facebook.com/help/131671940241729","www.facebook.com/help/172936839431357","www.facebook.com/help/190078864497547","www.facebook.com/help/206571136073851","www.facebook.com/help/297845860255949","www.facebook.com/help/389645087895231","www.facebook.com/help/408677896295618","www.facebook.com/help/538433456491590","www.facebook.com/help/contact/567360146613371","www.facebook.com/help/instagram/2638385956221960","www.facebook.com/help/messenger-app/833709093422928","www.facebook.com/help/www/181495968648557","www.facebook.com/settings?tab=privacy","www.fastcompany.com/3046772/why-online-harassment-is-still-ruining-lives-and-how-we-can-stop-it","www.fbi.gov/investigate/cyber","www.fightcyberstalking.org/emotional-support","www.forbes.com/sites/daniellecitron/2014/10/23/defining-online-harassment/#3aa927a028de","www.forbes.com/sites/erikkain/2015/05/14/internet-mob-justice-isnt-justice-at-all/#4e9c932c616b","www.fox32chicago.com/news/local/former-skinhead-forms-group-to-help-others-leave-hate-groups","www.genderit.org/resources/zen-and-art-making-tech-work-you","www.glbthotline.org","www.glbthotline.org/talkline.html","www.haltabuse.org/about/about.shtml","www.haltabuse.org/resources/laws/index.shtml","www.harpersbazaar.com/culture/features/a13517721/roxane-gay-hunger-interview","www.headspace.com","www.huffingtonpost.com/adam-levin/are-those-online-politica_b_13162006.html","www.huffingtonpost.com/traci-l-slatton/how-to-handle-email-haras_b_5606031.html","www.ic3.gov/complaint/default.aspx","www.ihollaback.org","www.ihollaback.org/bystander-resources","www.ihollaback.org/resources/bystander-resources","www.independent.co.uk/life-style/online-trolls-why-people-become-cyber-bullies-social-media-twitter-facebook-study-cornell-stanford-a7616126.html","www.intelius.com","www.iwmf.org/bjtrf","www.iwmf.org/programs/emergency-fund","www.lastpass.com/business-password-manager","www.law.cornell.edu/uscode/text/18/2261A","www.law.cornell.edu/wex/fighting_words#:~:targetText=Fighting%20words%20are%2C%20as%20first","www.learning-theories.com/online-disinhibition-effect-suler.html","www.lifehack.org/articles/technology/20-tips-use-google-search-efficiently.html","www.lifewire.com/auto-filter-sender-mail-to-folder-outlook-1173804","www.lifewire.com/what-is-blocking-on-twitter-2655403","www.linkedin.com/help/linkedin/answer/66","www.marieclaire.com/culture/news/a13403/online-harassment-terms-fight-back","www.merriam-webster.com/words-at-play/clapback-meaning-origin","www.msn.com/en-us/news/technology/analysis-why-nice-people-become-mean-online/ar-AAvoYcZ","www.nationalreview.com/2016/10/donald-trump-alt-right-internet-abuse-never-trump-movement","www.nbcnews.com/news/us-news/new-jersey-family-sue-school-district-after-12-year-old-n788506","www.ncbi.nlm.nih.gov/pmc/articles/PMC3477910","www.networksolutions.com/whois/index.jsp?bookmarked=d0c2a433ad7b00352730ae3ca1b7.059","www.newyorker.com/magazine/2014/09/01/troll-slayer","www.newyorker.com/magazine/2016/12/05/the-attorney-fighting-revenge-porn","www.npr.org/2016/07/06/484987245/jewish-reporters-harassed-by-trumps-anti-semitic-supporters","www.npr.org/sections/ed/2018/04/04/590928008/professor-harassment","www.nytco.com/the-times-is-partnering-with-jigsaw-to-expand-comment-capabilities","www.nytimes.com/2016/06/10/insider/why-i-quit-twitter-and-left-behind-35000-followers.html","www.nytimes.com/2016/06/20/us/mob-shaming-the-pillory-at-the-center-of-the-global-village.html","www.nytimes.com/2016/07/20/movies/leslie-jones-star-of-ghostbusters-becomes-a-target-of-online-trolls.html","www.nytimes.com/2017/06/13/insider/have-a-comment-leave-a-comment.html","www.nytimes.com/video/us/100000004467822/the-outrage-machine.html","www.pewinternet.org/2017/07/11/experiencing-online-harassment","www.pewinternet.org/2017/07/11/online-harassment-2017","www.pewinternet.org/2017/07/11/witnessing-online-harassment","www.pewresearch.org/fact-tank/2017/07/14/men-women-experience-and-view-online-harassment-differently","www.popsci.com/protect-privacy-social-media","www.pri.org/stories/2017-11-01/myanmar-fake-news-spread-facebook-stokes-ethnic-violence","www.privacyduck.com","www.propublica.org/article/facebook-hate-speech-censorship-internal-documents-algorithms","www.psychologytoday.com/blog/nurturing-self-compassion/201703/the-psychology-hate","www.psychologytoday.com/blog/your-online-secrets/201409/internet-trolls-are-narcissists-psychopaths-and-sadists","www.pw.org/literary_places","www.rainn.org/about-national-sexual-assault-telephone-hotline","www.rainn.org/statistics/victims-sexual-violence","www.rcfp.org/about","www.rcfp.org/legal-hotline","www.reputationdefender.com","www.reuters.com/article/us-health-sleep-daylight/morning-daylight-exposure-tied-to-a-good-nights-sleep-idUSKCN18E23E","www.sanvello.com","www.sanvello.com/?gclid=EAIaIQobChMIlK_H7MWX5gIVC2KGCh0E8AhKEAAYASAAEgK5LPD_BwE","www.shewrites.com","www.simplypsychology.org/maslow.html","www.slate.com/blogs/future_tense/2015/12/01/this_brazilian_campaign_is_putting_racist_comments_on_billboards.html","www.snapfiles.com/get/alphascreenshot.html","www.takebackthetech.net","www.talkspace.com","www.tandfonline.com/doi/full/10.1080/03637751.2015.1044256","www.techsafety.org/appsafetycenter","www.techsafety.org/confidentiality","www.techsafety.org/resources-survivors","www.techsafety.org/resources","www.theatlantic.com/health/archive/2015/10/internet-self-care/408580","www.theatlantic.com/technology/archive/2016/11/why-online-allies-matter-in-fighting-harassment/507722","www.theatlantic.com/technology/archive/2018/02/who-is-weev/553295","www.thedailybeast.com/russian-hackers-fancy-bear-targeted-hundreds-of-journalists","www.theguardian.com/books/booksblog/2016/aug/17/womenwriters-manifesto-aims-to-build-community-of-female-authors","www.theguardian.com/commentisfree/2016/apr/14/insults-rape-threats-writers-online-harassment","www.theguardian.com/commentisfree/audio/2016/may/28/cyberbullying-online-harassment-jessica-valenti-podcast","www.theguardian.com/society/2015/feb/02/what-happened-confronted-cruellest-troll-lindy-west","www.theguardian.com/technology/series/the-web-we-want","www.theguardian.com/us-news/2016/apr/28/julia-ioffe-journalist-melania-trump-antisemitic-abuse","www.thehotline.org","www.thestranger.com","www.theverge.com/2013/4/23/4253014/swatting-911-prank-wont-stop-hackers-celebrities","www.thisamericanlife.org/545/if-you-dont-have-anything-nice-to-say-say-it-in-all-caps","www.thisamericanlife.org/608/transcript","www.tineye.com","www.translifeline.org","www.unwomen.org/en/news/stories/2013/10/women-should-ads","www.us-cert.gov/ncas/tips/ST04-015","www.usatoday.com/story/tech/2017/07/12/online-harassment-rise-americans-want-tech-co-s-stop-it/469122001","www.uscourts.gov/about-federal-courts/types-cases/civil-cases","www.uscourts.gov/about-federal-courts/types-cases/criminal-cases","www.vice.com/en_us/article/zm8a9y/how-to-protect-yourself-from-sim-swapping-hacks","www.victimsofcrime.org","www.victimsofcrime.org/our-programs/national-crime-victim-bar-association","www.vidaweb.org","www.washingtonpost.com/lifestyle/style/theres-no-good-way-to-deal-with-trolls-so-you-might-as-well-tattle-to-their-moms/2017/01/02/90472a24-c7d4-11e6-8bee-54e800ef2a63_story.html?utm_term=.e28f41f1e0de","www.washingtonpost.com/news/inspired-life/wp/2018/01/08/a-man-trolled-sarah-silverman-on-twitter-she-ended-up-helping-him-with-his-medical-problems/?utm_term=.0e71a8548a3e","www.washingtonpost.com/news/the-intersect/wp/2014/10/14/the-only-guide-to-gamergate-you-will-ever-need-to-read/?utm_term=.e34f3567693a","www.whatsapp.com/legal/terms-of-service","www.wikihow.com/Take-a-Screenshot-in-Linux","www.wired.com/2014/10/content-moderation","www.wired.com/2016/02/ive-had-a-cyberstalker-since-i-was-12","www.wired.com/story/how-journalists-fought-back-against-crippling-email-bombs","www.withoutmyconsent.org","www.withoutmyconsent.org/resources/how-do-i-get-help-what-im-feeling","www.womensmediacenter.com/speech-project/research-statistics","www.wpbeginner.com/wp-tutorials/how-to-block-ip-addresses-in-wordpress","www.wsj.com/articles/why-our-mental-health-takes-a-village-1516640136","www.youtube.com/reportabuse","www.youtube.com/watch?v=F0ZJ7QVerr0","www.youtube.com/yt/about/policies/#community-guidelines","www1.nyc.gov/site/doh/health/health-topics/crisis-emergency-services.page","yandex.com/images","yourfriends.medium.com","zeltser.com/ddos-incident-cheat-sheet"]},
{"name":"sec.eff.org","size":100,"imports":[]},
{"name":"ssd.eff.org","size":100,"imports":[]},
{"name":"www.accessnow.org/a-first-look-at-digital-security","size":100,"imports":[]},
{"name":"docs.google.com/document/d/1q3gBvOEviV_0XMpMjvBiHSaKcl64uu4NwOoEVfXyYqU/edit","size":100,"imports":[]},
{"name":"thewirecutter.com/reviews/best-vpn-service","size":100,"imports":[]},
{"name":"freedom.press/news/11-tips-protecting-your-privacy-and-digital-security-age-trump","size":100,"imports":[]},
{"name":"hackblossom.org/cybersecurity","size":100,"imports":[]},
{"name":"www.cjfe.org/journalists_in_distress_securing_your_digital_life","size":100,"imports":[]},
{"name":"medium.com/cryptofriends/digital-security-training-resources-for-security-trainers-spring-2017-edition-e95d9e50065e","size":100,"imports":[]},
{"name":"susanemcg.gitbooks.io/digital-security-for-journalists/content/index.html","size":100,"imports":[]},
{"name":"cpj.org/reports/2012/04/technology-security.php","size":100,"imports":[]},
{"name":"mshelt.onl/tinfoil.press","size":100,"imports":[]},
{"name":"level-up.cc","size":100,"imports":[]},
{"name":"saferjourno.internews.org/pdf/SaferJourno_Guide.pdf","size":100,"imports":[]},
{"name":"rorypecktrust.org/resources/digital-security","size":100,"imports":[]},
{"name":"www.tcij.org/node/1016","size":100,"imports":[]},
{"name":"motherboard.vice.com/en_us/article/how-to-give-a-digital-security-training","size":100,"imports":[]},
{"name":"safetag.org/#audit","size":100,"imports":[]},
{"name":"orgsec.community/display/OS","size":100,"imports":[]},
{"name":"www.womensmediacenter.com/speech-project/tools-resources","size":100,"imports":[]},
{"name":"holistic-security.tacticaltech.org","size":100,"imports":[]},
{"name":"cpj.org/emergency-response","size":100,"imports":[]},
{"name":"www.journalistsecurity.net","size":100,"imports":[]},
{"name":"helpdesk.gijn.org/support/solutions/articles/14000036509-safety-and-security","size":100,"imports":[]},
{"name":"dartcenter.org","size":100,"imports":[]},
{"name":"www.internationalsos.com","size":100,"imports":[]},
{"name":"www.controlrisks.com","size":100,"imports":[]},
{"name":"www.oncallinternational.com","size":100,"imports":[]},
{"name":"securityplanner.org","size":100,"imports":[]},
{"name":"medium.com/@mshelton/securing-your-digital-life-like-a-normal-person-a-hasty-and-incomplete-guide-56437f127425","size":100,"imports":[]},
{"name":"motherboard.vice.com/en_us/article/the-motherboard-guide-to-not-getting-hacked","size":100,"imports":[]},
{"name":"secfirst.org/index.html","size":100,"imports":[]},
{"name":"medium.com/@mshelton/two-factor-authentication-for-newsrooms-a873060ea405","size":100,"imports":[]},
{"name":"arstechnica.com/security/2016/06/aiming-for-anonymity-ars-assesses-the-state-of-vpns-in-2016","size":100,"imports":[]},
{"name":"motherboard.vice.com/en_us/article/the-best-vpns-ranked","size":100,"imports":[]},
{"name":"theintercept.com/2015/04/27/encrypting-laptop-like-mean","size":100,"imports":[]},
{"name":"theintercept.com/2016/11/12/surveillance-self-defense-against-the-trump-administration","size":100,"imports":[]},
{"name":"medium.com/the-intercept/surveillance-self-defense-for-journalists-ce627e332db6","size":100,"imports":[]},
{"name":"theintercept.com/2015/11/12/edward-snowden-explains-how-to-reclaim-your-privacy","size":100,"imports":[]},
{"name":"theintercept.com/2017/05/01/cybersecurity-for-the-people-how-to-keep-your-chats-truly-private-with-signal","size":100,"imports":[]},
{"name":"otr.im","size":100,"imports":[]},
{"name":"medium.com/@mshelton/upgrading-whatsapp-security-386c8ce496d3","size":100,"imports":[]},
{"name":"source.opennews.org/articles/opening-secure-channels-confidential-tips","size":100,"imports":[]},
{"name":"docs.securedrop.org/en/stable/index.html","size":100,"imports":[]},
{"name":"securitytraining.opennews.org/en/latest/Chapter03-03-OrgBestPractices.html","size":100,"imports":["source.opennews.org/articles/opening-secure-channels-confidential-tips","source.opennews.org/articles/how-protect-your-sources-when-releasing-sensitive-","https.cio.gov/everything","developers.google.com/web/fundamentals/security/encrypt-in-transit/why-https","theintercept.com/leak","signal.org","whatsapp.com","wikipedia.org/wiki/Off-the-Record_Messaging","medium.com/@mshelton/signal-for-beginners-c6b44f76a1f0","medium.com/@mshelton/upgrading-whatsapp-security-386c8ce496d3","en.wikipedia.org/wiki/Pretty_Good_Privacy","securedrop.org"]},
{"name":"https.cio.gov/everything","size":100,"imports":[]},
{"name":"developers.google.com/web/fundamentals/security/encrypt-in-transit/why-https","size":100,"imports":[]},
{"name":"theintercept.com/leak","size":100,"imports":[]},
{"name":"whatsapp.com","size":100,"imports":[]},
{"name":"wikipedia.org/wiki/Off-the-Record_Messaging","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Pretty_Good_Privacy","size":100,"imports":[]},
{"name":"source.opennews.org/articles/two-factor-authentication-newsrooms","size":100,"imports":[]},
{"name":"lastpass.com","size":100,"imports":[]},
{"name":"keepassxc.org","size":100,"imports":[]},
{"name":"support.apple.com/en-us/HT202064","size":100,"imports":[]},
{"name":"support.google.com/nexus/answer/2844831","size":100,"imports":[]},
{"name":"www.pcworld.com/article/2308725/encryption/a-beginners-guide-to-bitlocker-windows-built-in-encryption-tool.html","size":100,"imports":[]},
{"name":"www.torproject.org/projects/torbrowser.html.en","size":100,"imports":[]},
{"name":"spideroak.comtresorit.com","size":100,"imports":[]},
{"name":"freedom.press/news/signal-beginners","size":100,"imports":[]},
{"name":"ricochet.im","size":100,"imports":[]},
{"name":"otr.cypherpunks.ca/help/authenticate.php","size":100,"imports":[]},
{"name":"source.opennews.org/en-US/articles/digital-self-defense-journalists-introduction","size":100,"imports":[]},
{"name":"cpj.org/reports/2012/04/journalist-security-guide.php","size":100,"imports":[]},
{"name":"freedom.press/anti-phishing-and-email-hygiene","size":100,"imports":[]},
{"name":"source.opennews.org/guides/speaking-securely-sources","size":100,"imports":[]},
{"name":"source.opennews.org/en-US/guides/defending-accounts","size":100,"imports":[]},
{"name":"tinfoil.press","size":100,"imports":[]},
{"name":"guides.accessnow.org/safer_travel_guide.html#the-risks","size":100,"imports":["support.apple.com/en-us/HT204837","securityinabox.org/en/guide/malware","www.eff.org/deeplinks/2016/12/12-days-2fa-how-enable-two-factor-authentication-your-online-accounts","www.gp-digital.org/national-encryption-laws-and-policies","cryptolaw.org/cls-sum.htm","cryptolaw.org","informationsecurity.princeton.edu/encryption/encryption-and-internatio","www.eff.org/de/https-everywhere","ssd.eff.org/en/module/choosing-vpn-thats-right-you","www.torproject.org/download/download-easy.html.en","bridges.torproject.org","blog.torproject.org/blog/breaking-through-censorship-barriers-even-when-tor-blocked","securityinabox.org/en/guide/smartphones","guardianproject.info/apps/orbot","guardianproject.info/apps/orfox","mike.tig.as/onionbrowser","keepassxc.org","www.eff.org/de/dice","www.veracrypt.fr/en/Hidden%20Volume.html","securityinabox.org/en/guide/veracrypt/windows/#creating-a-hidden-volume","securityinabox.org/en/guide/veracrypt/mac/#creating-a-hidden-volume","securityinabox.org/en/guide/veracrypt/linux/#creating-a-hidden-volume","technet.microsoft.com/en-us/library/dd835565","blogs.msdn.microsoft.com/mvpawardprogram/2016/01/12/securing-windows-10-with-bitlocker-drive-encryption","www.veracrypt.fr","medium.com/@securitystreak/veracrypt-full-disk-drive-encryption-fde-157eacbf0b61","www.techsoup.org","secfirst.org/index.html","www.eff.org/wp/digital-privacy-us-border-2017","ssd.eff.org/en/module/things-consider-when-crossing-us-border","informationsecurity.princeton.edu/intltravel"]},
{"name":"securityinabox.org/en/guide/malware","size":100,"imports":[]},
{"name":"www.gp-digital.org/national-encryption-laws-and-policies","size":100,"imports":[]},
{"name":"cryptolaw.org/cls-sum.htm","size":100,"imports":[]},
{"name":"cryptolaw.org","size":100,"imports":[]},
{"name":"informationsecurity.princeton.edu/encryption/encryption-and-internatio","size":100,"imports":[]},
{"name":"www.eff.org/de/https-everywhere","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/choosing-vpn-thats-right-you","size":100,"imports":[]},
{"name":"www.torproject.org/download/download-easy.html.en","size":100,"imports":[]},
{"name":"bridges.torproject.org","size":100,"imports":[]},
{"name":"blog.torproject.org/blog/breaking-through-censorship-barriers-even-when-tor-blocked","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/smartphones","size":100,"imports":[]},
{"name":"guardianproject.info/apps/orbot","size":100,"imports":[]},
{"name":"guardianproject.info/apps/orfox","size":100,"imports":[]},
{"name":"mike.tig.as/onionbrowser","size":100,"imports":[]},
{"name":"www.eff.org/de/dice","size":100,"imports":[]},
{"name":"www.veracrypt.fr/en/Hidden%20Volume.html","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/veracrypt/windows/#creating-a-hidden-volume","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/veracrypt/mac/#creating-a-hidden-volume","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/veracrypt/linux/#creating-a-hidden-volume","size":100,"imports":[]},
{"name":"technet.microsoft.com/en-us/library/dd835565","size":100,"imports":[]},
{"name":"blogs.msdn.microsoft.com/mvpawardprogram/2016/01/12/securing-windows-10-with-bitlocker-drive-encryption","size":100,"imports":[]},
{"name":"www.veracrypt.fr","size":100,"imports":[]},
{"name":"medium.com/@securitystreak/veracrypt-full-disk-drive-encryption-fde-157eacbf0b61","size":100,"imports":[]},
{"name":"www.techsoup.org","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/things-consider-when-crossing-us-border","size":100,"imports":[]},
{"name":"informationsecurity.princeton.edu/intltravel","size":100,"imports":[]},
{"name":"ijnet.org/en/story/digital-security-tips-and-resources-journalists","size":100,"imports":["www.icfj.org","twitter.com/sdoig","ssd.eff.org/en","ssd.eff.org/en/module/seven-steps-digital-security","securityinabox.org/en","freedom.press/training","www.cpj.org/reports/2012/04/information-security.php#3","wefightcensorship.org/online-survival-kithtml.html","digitaldefenders.org/digitalfirstaid","www.tcij.org/node/1016","www.icfj.org/calendar/icfj-tribute-journalists-2020"]},
{"name":"www.icfj.org","size":100,"imports":[]},
{"name":"twitter.com/sdoig","size":100,"imports":[]},
{"name":"ssd.eff.org/en","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/seven-steps-digital-security","size":100,"imports":[]},
{"name":"securityinabox.org/en","size":100,"imports":[]},
{"name":"freedom.press/training","size":100,"imports":[]},
{"name":"www.cpj.org/reports/2012/04/information-security.php#3","size":100,"imports":[]},
{"name":"wefightcensorship.org/online-survival-kithtml.html","size":100,"imports":[]},
{"name":"digitaldefenders.org/digitalfirstaid","size":100,"imports":[]},
{"name":"www.icfj.org/calendar/icfj-tribute-journalists-2020","size":100,"imports":[]},
{"name":"mediashift.org/2015/03/a-guide-to-cybersecurity-for-journalists","size":100,"imports":["www.poynter.org/news/media-innovation/200418/5-ways-journalists-can-use-smartphone-apps-for-reporting","www.washingtonpost.com/blogs/the-switch/wp/2014/05/06/three-charts-that-explain-how-u-s-journalists-use-social-media","arstechnica.com/apple/2014/09/apple-expands-data-encryption-under-ios-8-making-handover-to-cops-moot","www.maketecheasier.com/truecrypt-alternatives","www.wikihow.com/Password-Protect-a-Microsoft-Word-Document","www.cjr.org/the_news_frontier/teaching_cyber-security.php?page=all","www.cjr.org/behind_the_news/cybersecurity_cyber_cyber_cybe.php","www.cnet.com/news/bad-flash-drive-caused-worst-u-s-military-breach","www.ire.org/tag/data-security"]},
{"name":"www.poynter.org/news/media-innovation/200418/5-ways-journalists-can-use-smartphone-apps-for-reporting","size":100,"imports":[]},
{"name":"www.washingtonpost.com/blogs/the-switch/wp/2014/05/06/three-charts-that-explain-how-u-s-journalists-use-social-media","size":100,"imports":[]},
{"name":"arstechnica.com/apple/2014/09/apple-expands-data-encryption-under-ios-8-making-handover-to-cops-moot","size":100,"imports":[]},
{"name":"www.maketecheasier.com/truecrypt-alternatives","size":100,"imports":[]},
{"name":"www.wikihow.com/Password-Protect-a-Microsoft-Word-Document","size":100,"imports":[]},
{"name":"www.cjr.org/the_news_frontier/teaching_cyber-security.php?page=all","size":100,"imports":[]},
{"name":"www.cjr.org/behind_the_news/cybersecurity_cyber_cyber_cybe.php","size":100,"imports":[]},
{"name":"www.cnet.com/news/bad-flash-drive-caused-worst-u-s-military-breach","size":100,"imports":[]},
{"name":"www.ire.org/tag/data-security","size":100,"imports":[]},
{"name":"medium.com/thoughts-on-journalism/defense-against-the-dark-arts-385aff5ed2f2","size":100,"imports":["www.torproject.org/projects/torbrowser.html.en","pwsafe.org","keepass.info","www.facebook.com/help/148233965247823","support.google.com/accounts/answer/185839","support.apple.com/HT204152","getadblock.com","adblockplus.org","github.com/gorhill/uBlock#installation","www.eff.org/privacybadger","chrome.google.com/webstore/detail/umatrix","www.ghostery.com/our-solutions/ghostery-browser-extention","security.stackexchange.com/questions/8145/does-https-prevent-man-in-the-middle-attacks-by-proxy-server","duckduckgo.com","startpage.com","www.facebook.com/notes/facebook-over-tor/adding-tor-support-on-android","www.eff.org/https-everywhere%20","docs.google.com/spreadsheets/d/1FJTvWT5RHFSYuEoFVpAeQjuQPU4BVzbOigT0xebxTOw","www.cactusvpn.com","www.goldenfrog.com/vyprvpn","www.purevpn.com","www.schneier.com/blog/archives/2015/03/can_the_nsa_bre_1.html","veracrypt.codeplex.com","buy.symantec.com/estore/clp/productdetails/pk/drive-encryption","www.axantum.com/AxCrypt","sourceforge.net/projects/eraser","crypto.cat","spideroak.com","www.geek.com/news/kim-dotcom-says-his-own-mega-cloud-storage-service-isnt-safe-anymore-1629958","viivo.com","viivo.com","www.boxcryptor.com","whispersystems.org","l.aunch.us/eMXsI","www.theregister.co.uk/2015/11/23/homebrew_crypto_in_telegram_app","twitter.com/Snowden/status/678271881242374144","github.com/davidlazar/vuvuzela","pl.wikipedia.org/wiki/Prawo_Metcalfe%27a","www.eff.org/secure-messaging-scorecard","play.google.com/store/apps/details%3Fid%3Dorg.torproject.android","play.google.com/store/apps/details?id=com.findsdk.apppermission&hl=nl","play.google.com/store/apps/details%3Fid%3Dcom.domobile.applock","dev.guardianproject.info/projects/google-summer-of-code/wiki/Orfox_-_Firefox-based_Privacy_Enhanced_Browser/1","itunes.apple.com/us/app/onion-browser/id519296448%3Fmt%3D8","gpgtools.org","notes.jerzygangi.com/the-best-pgp-tutorial-for-mac-os-x-ever","thetinhat.com/tutorials/darknets/tor-vpn-using-both.html","www.bestvpn.com/blog/12273/using-tor-vpn-together","thetinhat.com/tutorials/darknets/tor-vpn-using-both.html","tails.boum.org/contribute/design/MAC_address","levelup.gitconnected.com/pi-hole-on-raspberry-pi-using-docker-docker-compose-8dc3944f6282","levelup.gitconnected.com/pi-hole-on-raspberry-pi-using-docker-docker-compose-8dc3944f6282","levelup.gitconnected.com"]},
{"name":"pwsafe.org","size":100,"imports":[]},
{"name":"support.google.com/accounts/answer/185839","size":100,"imports":[]},
{"name":"support.apple.com/HT204152","size":100,"imports":[]},
{"name":"getadblock.com","size":100,"imports":[]},
{"name":"github.com/gorhill/uBlock#installation","size":100,"imports":[]},
{"name":"chrome.google.com/webstore/detail/umatrix","size":100,"imports":[]},
{"name":"www.ghostery.com/our-solutions/ghostery-browser-extention","size":100,"imports":[]},
{"name":"security.stackexchange.com/questions/8145/does-https-prevent-man-in-the-middle-attacks-by-proxy-server","size":100,"imports":[]},
{"name":"duckduckgo.com","size":100,"imports":[]},
{"name":"startpage.com","size":100,"imports":[]},
{"name":"www.facebook.com/notes/facebook-over-tor/adding-tor-support-on-android","size":100,"imports":[]},
{"name":"www.eff.org/https-everywhere%20","size":100,"imports":[]},
{"name":"docs.google.com/spreadsheets/d/1FJTvWT5RHFSYuEoFVpAeQjuQPU4BVzbOigT0xebxTOw","size":100,"imports":[]},
{"name":"www.cactusvpn.com","size":100,"imports":[]},
{"name":"www.goldenfrog.com/vyprvpn","size":100,"imports":[]},
{"name":"www.purevpn.com","size":100,"imports":[]},
{"name":"www.schneier.com/blog/archives/2015/03/can_the_nsa_bre_1.html","size":100,"imports":[]},
{"name":"veracrypt.codeplex.com","size":100,"imports":[]},
{"name":"buy.symantec.com/estore/clp/productdetails/pk/drive-encryption","size":100,"imports":[]},
{"name":"www.axantum.com/AxCrypt","size":100,"imports":[]},
{"name":"sourceforge.net/projects/eraser","size":100,"imports":[]},
{"name":"crypto.cat","size":100,"imports":[]},
{"name":"www.geek.com/news/kim-dotcom-says-his-own-mega-cloud-storage-service-isnt-safe-anymore-1629958","size":100,"imports":[]},
{"name":"viivo.com","size":100,"imports":[]},
{"name":"www.boxcryptor.com","size":100,"imports":[]},
{"name":"whispersystems.org","size":100,"imports":[]},
{"name":"l.aunch.us/eMXsI","size":100,"imports":[]},
{"name":"www.theregister.co.uk/2015/11/23/homebrew_crypto_in_telegram_app","size":100,"imports":[]},
{"name":"twitter.com/Snowden/status/678271881242374144","size":100,"imports":[]},
{"name":"github.com/davidlazar/vuvuzela","size":100,"imports":[]},
{"name":"pl.wikipedia.org/wiki/Prawo_Metcalfe%27a","size":100,"imports":[]},
{"name":"www.eff.org/secure-messaging-scorecard","size":100,"imports":[]},
{"name":"play.google.com/store/apps/details%3Fid%3Dorg.torproject.android","size":100,"imports":[]},
{"name":"play.google.com/store/apps/details?id=com.findsdk.apppermission&hl=nl","size":100,"imports":[]},
{"name":"play.google.com/store/apps/details%3Fid%3Dcom.domobile.applock","size":100,"imports":[]},
{"name":"dev.guardianproject.info/projects/google-summer-of-code/wiki/Orfox_-_Firefox-based_Privacy_Enhanced_Browser/1","size":100,"imports":[]},
{"name":"itunes.apple.com/us/app/onion-browser/id519296448%3Fmt%3D8","size":100,"imports":[]},
{"name":"notes.jerzygangi.com/the-best-pgp-tutorial-for-mac-os-x-ever","size":100,"imports":[]},
{"name":"thetinhat.com/tutorials/darknets/tor-vpn-using-both.html","size":100,"imports":[]},
{"name":"www.bestvpn.com/blog/12273/using-tor-vpn-together","size":100,"imports":[]},
{"name":"tails.boum.org/contribute/design/MAC_address","size":100,"imports":[]},
{"name":"levelup.gitconnected.com/pi-hole-on-raspberry-pi-using-docker-docker-compose-8dc3944f6282","size":100,"imports":[]},
{"name":"levelup.gitconnected.com","size":100,"imports":[]},
{"name":"newssafety.org/safety/advisories/staying-safe-online","size":100,"imports":["www.tcij.org/node/1016","veracrypt.codeplex.com","Ubuntu.com","tails.boum.org","www.getfirefox.com","www.macupdate.com/app/mac/36244/chromium","www.torproject.org","www.cryptolaw.org","www.gmx.co.uk","mail.yandex.com","www.eff.org/https-everywhere","osxfuse.github.io","mega.co.nz"]},
{"name":"Ubuntu.com","size":100,"imports":[]},
{"name":"www.getfirefox.com","size":100,"imports":[]},
{"name":"www.macupdate.com/app/mac/36244/chromium","size":100,"imports":[]},
{"name":"www.torproject.org","size":100,"imports":[]},
{"name":"www.cryptolaw.org","size":100,"imports":[]},
{"name":"www.gmx.co.uk","size":100,"imports":[]},
{"name":"mail.yandex.com","size":100,"imports":[]},
{"name":"osxfuse.github.io","size":100,"imports":[]},
{"name":"mega.co.nz","size":100,"imports":[]},
{"name":"protonmail.com/blog/journalist-online-security-tips","size":100,"imports":["ijasia16.sched.com/speaker/andyyen","gizmodo.com/over-560-million-passwords-discovered-by-security-resea-1795254560","1password.com/security","www.wired.com/2012/08/apple-amazon-mat-honan-hacking","authy.com","support.microsoft.com/km-kh/help/4028713/windows-10-turn-on-device-encryption","support.apple.com/en-us/HT204837","www.cnet.com/how-to/how-to-encrypt-your-ios-or-android-device","www.dailywire.com/news/25889/shock-report-twitter-spies-its-users-pays-daily-wire","signal.org","wire.com/en","ip.me","protonvpn.com","protonvpn.com/secure-vpn","protonvpn.com/blog/threat-model","www.tcij.org","www.passwordstore.org","thesmarthomeguru.com","www.staticjobs.com/faq.php","intersty.com","sogomonyan.com","saynotodisease.com"]},
{"name":"ijasia16.sched.com/speaker/andyyen","size":100,"imports":[]},
{"name":"gizmodo.com/over-560-million-passwords-discovered-by-security-resea-1795254560","size":100,"imports":[]},
{"name":"1password.com/security","size":100,"imports":[]},
{"name":"www.wired.com/2012/08/apple-amazon-mat-honan-hacking","size":100,"imports":[]},
{"name":"support.microsoft.com/km-kh/help/4028713/windows-10-turn-on-device-encryption","size":100,"imports":[]},
{"name":"www.cnet.com/how-to/how-to-encrypt-your-ios-or-android-device","size":100,"imports":[]},
{"name":"www.dailywire.com/news/25889/shock-report-twitter-spies-its-users-pays-daily-wire","size":100,"imports":[]},
{"name":"ip.me","size":100,"imports":[]},
{"name":"protonvpn.com","size":100,"imports":[]},
{"name":"protonvpn.com/secure-vpn","size":100,"imports":[]},
{"name":"protonvpn.com/blog/threat-model","size":100,"imports":[]},
{"name":"www.tcij.org","size":100,"imports":[]},
{"name":"www.passwordstore.org","size":100,"imports":[]},
{"name":"thesmarthomeguru.com","size":100,"imports":[]},
{"name":"www.staticjobs.com/faq.php","size":100,"imports":[]},
{"name":"intersty.com","size":100,"imports":[]},
{"name":"sogomonyan.com","size":100,"imports":[]},
{"name":"saynotodisease.com","size":100,"imports":[]},
{"name":"rsf.org/en/news/seven-digital-security-habits-journalists-should-adopt","size":100,"imports":["fortune.com/2017/06/09/twitter-hack-fake-news","searchsecurity.techtarget.com/definition/phishing","nothing2hide.org/verifier-la-robustesse-de-votre-mot-de-passe","heimdalsecurity.com/blog/doxxing","tails.boum.org","www.upwork.com/hiring/development/introduction-to-encryption-data-security","en.wikipedia.org/wiki/Comparison_of_virtual_private_network_services","www.torproject.org/projects/torbrowser.html.en","guardianproject.info","signal.org","www.eff.org/fr/https-everywhere","ssd.eff.org/fr","sec.eff.org","www.accessnow.org/help/?ignorelocale"]},
{"name":"fortune.com/2017/06/09/twitter-hack-fake-news","size":100,"imports":[]},
{"name":"searchsecurity.techtarget.com/definition/phishing","size":100,"imports":[]},
{"name":"nothing2hide.org/verifier-la-robustesse-de-votre-mot-de-passe","size":100,"imports":[]},
{"name":"heimdalsecurity.com/blog/doxxing","size":100,"imports":[]},
{"name":"www.upwork.com/hiring/development/introduction-to-encryption-data-security","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/Comparison_of_virtual_private_network_services","size":100,"imports":[]},
{"name":"guardianproject.info","size":100,"imports":[]},
{"name":"www.eff.org/fr/https-everywhere","size":100,"imports":[]},
{"name":"ssd.eff.org/fr","size":100,"imports":[]},
{"name":"www.accessnow.org/help/?ignorelocale","size":100,"imports":[]},
{"name":"source.opennews.org/articles/security-journalists-part-one-basics","size":100,"imports":["www.washingtonpost.com/blogs/worldviews/wp/2013/04/23/syrian-hackers-claim-ap-hack-that-tipped-stock-market-by-136-billion-is-it-terrorism","www.salon.com/2013/04/24/how_a_twitter_hack_sent_the_market_plummeting_ap","www.cjr.org/feature/the_spy_who_came_in_from_the_c.php?page=all","web.cs.du.edu/~mitchell/forensics/information/pass_crack.html","xkcd.com/936","agilebits.com/onepassword","lastpass.com","support.google.com/accounts/answer/180744?hl=en","lifehacker.com/5938565/heres-everywhere-you-should-enable-two-factor-authentication-right-now","www.kuro5hin.org/story/2004/6/3/223758/2267","www.reuters.com/article/2013/11/08/net-us-usa-security-snowden-idUSBRE9A703020131108","techcrunch.com/2013/04/23/ap-twitter-hack-preceded-by-a-phishing-attempt-news-org-says","www.thinkmac.net/tutorials/2009/5/29/enable-the-status-bar-in-safari-mac-tips-daily-271.html","myonlinesecurity.co.uk/show-known-file-types","www.howtogeek.com/171993/macros-explained-why-microsoft-office-files-can-be-dangerous","blogs.mcafee.com/consumer/drive-by-download","windows.microsoft.com/en-us/windows-8/bitlocker-drive-encryption","support.apple.com/kb/ht4790","jonathanstray.com","www.mozilla.org/en-US/foundation","communitypartners.org"]},
{"name":"www.washingtonpost.com/blogs/worldviews/wp/2013/04/23/syrian-hackers-claim-ap-hack-that-tipped-stock-market-by-136-billion-is-it-terrorism","size":100,"imports":[]},
{"name":"www.salon.com/2013/04/24/how_a_twitter_hack_sent_the_market_plummeting_ap","size":100,"imports":[]},
{"name":"www.cjr.org/feature/the_spy_who_came_in_from_the_c.php?page=all","size":100,"imports":[]},
{"name":"web.cs.du.edu/~mitchell/forensics/information/pass_crack.html","size":100,"imports":[]},
{"name":"xkcd.com/936","size":100,"imports":[]},
{"name":"agilebits.com/onepassword","size":100,"imports":[]},
{"name":"support.google.com/accounts/answer/180744?hl=en","size":100,"imports":[]},
{"name":"lifehacker.com/5938565/heres-everywhere-you-should-enable-two-factor-authentication-right-now","size":100,"imports":[]},
{"name":"www.kuro5hin.org/story/2004/6/3/223758/2267","size":100,"imports":[]},
{"name":"www.reuters.com/article/2013/11/08/net-us-usa-security-snowden-idUSBRE9A703020131108","size":100,"imports":[]},
{"name":"techcrunch.com/2013/04/23/ap-twitter-hack-preceded-by-a-phishing-attempt-news-org-says","size":100,"imports":[]},
{"name":"www.thinkmac.net/tutorials/2009/5/29/enable-the-status-bar-in-safari-mac-tips-daily-271.html","size":100,"imports":[]},
{"name":"myonlinesecurity.co.uk/show-known-file-types","size":100,"imports":[]},
{"name":"www.howtogeek.com/171993/macros-explained-why-microsoft-office-files-can-be-dangerous","size":100,"imports":[]},
{"name":"blogs.mcafee.com/consumer/drive-by-download","size":100,"imports":[]},
{"name":"windows.microsoft.com/en-us/windows-8/bitlocker-drive-encryption","size":100,"imports":[]},
{"name":"support.apple.com/kb/ht4790","size":100,"imports":[]},
{"name":"jonathanstray.com","size":100,"imports":[]},
{"name":"www.mozilla.org/en-US/foundation","size":100,"imports":[]},
{"name":"communitypartners.org","size":100,"imports":[]},
{"name":"www.eff.org/deeplinks/2020/06/digital-security-advice-journalists-covering-protests-against-police-killings","size":100,"imports":["theintercept.com/2016/01/12/sean-penn-el-chapo-opsec","theintercept.com/2020/06/04/journalists-attacked-police-george-floyd-protests","apps.apple.com/us/app/signal-private-messenger/id874139669","play.google.com/store/apps/details?id=org.thoughtcrime.securesms","support.apple.com/en-us/HT204264","support.google.com/photos/answer/6193313?co=GENIE.Platform%3DAndroid&hl=en","cpj.org/2020/05/cpj-safety-advisory-covering-u-s-protests-over-police-violence","freedom.press/training/mobile-security-protest-preparation-tips-activists"]},
{"name":"theintercept.com/2016/01/12/sean-penn-el-chapo-opsec","size":100,"imports":[]},
{"name":"theintercept.com/2020/06/04/journalists-attacked-police-george-floyd-protests","size":100,"imports":[]},
{"name":"apps.apple.com/us/app/signal-private-messenger/id874139669","size":100,"imports":[]},
{"name":"play.google.com/store/apps/details?id=org.thoughtcrime.securesms","size":100,"imports":[]},
{"name":"support.apple.com/en-us/HT204264","size":100,"imports":[]},
{"name":"support.google.com/photos/answer/6193313?co=GENIE.Platform%3DAndroid&hl=en","size":100,"imports":[]},
{"name":"cpj.org/2020/05/cpj-safety-advisory-covering-u-s-protests-over-police-violence","size":100,"imports":[]},
{"name":"freedom.press/training/mobile-security-protest-preparation-tips-activists","size":100,"imports":[]},
{"name":"www.facebook.com/facebookmedia/blog/safety-tips-for-journalists","size":100,"imports":["help.instagram.com/285881641526716","www.connectsafely.org","ejc.net","www.frontlinefreelance.org","www.sipiapa.org/contenidos/home.html","www.jamesfoleyfoundation.org","www.internews.org"]},
{"name":"help.instagram.com/285881641526716","size":100,"imports":[]},
{"name":"www.connectsafely.org","size":100,"imports":[]},
{"name":"ejc.net","size":100,"imports":[]},
{"name":"www.frontlinefreelance.org","size":100,"imports":[]},
{"name":"www.sipiapa.org/contenidos/home.html","size":100,"imports":[]},
{"name":"www.jamesfoleyfoundation.org","size":100,"imports":[]},
{"name":"www.internews.org","size":100,"imports":[]},
{"name":"www.icij.org/inside-icij/2018/01/five-digital-security-tools-to-protect-your-work-and-sources","size":100,"imports":["www.torproject.org/projects/torbrowser.html.en","signal.org","keepassxc.org","www.npr.org/sections/parallels/2017/12/22/572822696/number-of-journalists-killed-in-mexico-reaches-historical-high-report-says","www.nytimes.com/2018/01/10/world/asia/myanmar-reuters-reporters.html","www.pri.org/stories/2017-06-28/turkey-jails-more-journalists-any-other-nation-those-detention-are-all-terrorists","cpj.org/blog/2018/01/press-oppressor-awards-trump-fake-news-fakies.php","www.nytimes.com/2016/01/27/nyregion/what-happened-to-jane-mayer-when-she-wrote-about-the-koch-brothers.html","www.newyorker.com/news/news-desk/harvey-weinsteins-army-of-spies","rsf.org/en/2017-press-freedom-index-ever-darker-world-map","rsf.org","www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html","www.cjfe.org/journalists_in_distress_study","www.npr.org/sections/alltechconsidered/2017/02/27/517037537/how-the-media-are-using-encryption-tools-to-collect-anonymous-tips","freedom.press","www.wired.com/story/ditch-all-those-other-messaging-apps-heres-why-you-should-use-signal","gizmodo.com/facebook-blew-it-on-messenger-encryption-1783331971","securityplanner.org/#/tool/signal","www.eff.org","media.ccc.de/v/34c3-9086-protecting_your_privacy_at_the_border","securityplanner.org/#/tool/mac-encryption","securityplanner.org/#/tool/windows-encryption","veracrypt.codeplex.com","spideroak.com","keybase.io/docs/kbfs","tresorit.com","www.jungledisk.com","tacticaltech.org","securityplanner.org/#/tool/password-manager","thewirecutter.com/reviews/best-password-managers","www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin","www.nytimes.com/2017/10/25/technology/personaltech/google-keys-advanced-protection-program.html","landing.google.com/advancedprotection","slack.com","www.wired.com/2017/03/hack-brief-slack-bug-everyones-worst-office-nightmare","nymag.com/selectall/2017/05/what-has-slack-done-to-the-office.html","spideroak.com/semaphor","about.mattermost.com/slack-vs-mattermost","ssd.eff.org/en/module/assessing-your-risks","duckduckgo.com","securityplanner.org/#"]},
{"name":"www.npr.org/sections/parallels/2017/12/22/572822696/number-of-journalists-killed-in-mexico-reaches-historical-high-report-says","size":100,"imports":[]},
{"name":"www.nytimes.com/2018/01/10/world/asia/myanmar-reuters-reporters.html","size":100,"imports":[]},
{"name":"www.pri.org/stories/2017-06-28/turkey-jails-more-journalists-any-other-nation-those-detention-are-all-terrorists","size":100,"imports":[]},
{"name":"cpj.org/blog/2018/01/press-oppressor-awards-trump-fake-news-fakies.php","size":100,"imports":[]},
{"name":"www.nytimes.com/2016/01/27/nyregion/what-happened-to-jane-mayer-when-she-wrote-about-the-koch-brothers.html","size":100,"imports":[]},
{"name":"www.newyorker.com/news/news-desk/harvey-weinsteins-army-of-spies","size":100,"imports":[]},
{"name":"rsf.org/en/2017-press-freedom-index-ever-darker-world-map","size":100,"imports":[]},
{"name":"rsf.org","size":100,"imports":[]},
{"name":"www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html","size":100,"imports":[]},
{"name":"www.cjfe.org/journalists_in_distress_study","size":100,"imports":[]},
{"name":"www.npr.org/sections/alltechconsidered/2017/02/27/517037537/how-the-media-are-using-encryption-tools-to-collect-anonymous-tips","size":100,"imports":[]},
{"name":"freedom.press","size":100,"imports":[]},
{"name":"www.wired.com/story/ditch-all-those-other-messaging-apps-heres-why-you-should-use-signal","size":100,"imports":[]},
{"name":"gizmodo.com/facebook-blew-it-on-messenger-encryption-1783331971","size":100,"imports":[]},
{"name":"securityplanner.org/#/tool/signal","size":100,"imports":[]},
{"name":"www.eff.org","size":100,"imports":[]},
{"name":"media.ccc.de/v/34c3-9086-protecting_your_privacy_at_the_border","size":100,"imports":[]},
{"name":"securityplanner.org/#/tool/mac-encryption","size":100,"imports":[]},
{"name":"securityplanner.org/#/tool/windows-encryption","size":100,"imports":[]},
{"name":"keybase.io/docs/kbfs","size":100,"imports":[]},
{"name":"www.jungledisk.com","size":100,"imports":[]},
{"name":"tacticaltech.org","size":100,"imports":[]},
{"name":"securityplanner.org/#/tool/password-manager","size":100,"imports":[]},
{"name":"www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin","size":100,"imports":[]},
{"name":"www.nytimes.com/2017/10/25/technology/personaltech/google-keys-advanced-protection-program.html","size":100,"imports":[]},
{"name":"slack.com","size":100,"imports":[]},
{"name":"www.wired.com/2017/03/hack-brief-slack-bug-everyones-worst-office-nightmare","size":100,"imports":[]},
{"name":"nymag.com/selectall/2017/05/what-has-slack-done-to-the-office.html","size":100,"imports":[]},
{"name":"spideroak.com/semaphor","size":100,"imports":[]},
{"name":"about.mattermost.com/slack-vs-mattermost","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/assessing-your-risks","size":100,"imports":[]},
{"name":"securityplanner.org/#","size":100,"imports":[]},
{"name":"1password.com/for-journalism","size":100,"imports":[]},
{"name":"99u.adobe.com/articles/25151/dont-feed-the-haters-the-confessions-of-a-former-troll","size":100,"imports":[]},
{"name":"abine.com/deleteme","size":100,"imports":[]},
{"name":"adaa.org","size":100,"imports":[]},
{"name":"adaa.org/finding-help/treatment","size":100,"imports":[]},
{"name":"adaa.org/finding-help/treatment/low-cost-treatment","size":100,"imports":[]},
{"name":"amwell.com","size":100,"imports":[]},
{"name":"apnews.com/ddd6ef11541649ac93ed2f2df5c56224/troll-lulz-target-online-abuse-isnt-amused","size":100,"imports":[]},
{"name":"apps.apple.com/gb/app/exif-viewer/id562827354","size":100,"imports":[]},
{"name":"aruljohn.com/info/howtofindipaddress","size":100,"imports":[]},
{"name":"arxiv.org/abs/1702.01119","size":100,"imports":[]},
{"name":"blog.torproject.org","size":100,"imports":[]},
{"name":"blog.torproject.org/solidarity-against-online-harassment","size":100,"imports":[]},
{"name":"booksbywomen.org","size":100,"imports":[]},
{"name":"careforyourmind.org/what-to-do-when-you-cant-afford-therapy/#more-1447","size":100,"imports":[]},
{"name":"civilservant.io/moderation_experiment_r_science_rule_posting.html","size":100,"imports":[]},
{"name":"coralproject.net","size":100,"imports":[]},
{"name":"coralproject.net/blog/marginalized-voices-in-comment-spaces","size":100,"imports":[]},
{"name":"coralproject.net/talk","size":100,"imports":[]},
{"name":"cpj.org/blog/2018/03/journalists-covering-us-white-supremacists-must-we.php","size":100,"imports":[]},
{"name":"crashoverridenetwork.tumblr.com","size":100,"imports":[]},
{"name":"crashoverridenetwork.tumblr.com/post/113748237272/guide-talking-to-family-police","size":100,"imports":[]},
{"name":"creator.zohopublic.com/jessicafj/intake-main/form-perma/Intake_Form/aBJRkvxh1h5t3RzK3VYNRXCNPuHpKZsOGgzECswDjwdXzYOpQy5GpMHfJ34JEa7jC5RyukAQkZOBuyYps8WAVswXGu60Rguw6SEG","size":100,"imports":[]},
{"name":"cyberbullying.org","size":100,"imports":[]},
{"name":"cyberbullying.org/bullying-laws","size":100,"imports":[]},
{"name":"cyberbullying.org/resources/adults","size":100,"imports":[]},
{"name":"dangerousspeech.org","size":100,"imports":[]},
{"name":"dangerousspeech.org/counterspeech","size":100,"imports":[]},
{"name":"datacloudoptout.oracle.com/optout","size":100,"imports":[]},
{"name":"dictionary.findlaw.com/definition/true-threat.html","size":100,"imports":[]},
{"name":"docs.google.com/document/d/1ud1ILFkIG0BeLX9jlzJMxCPm8-cSeqPjU60nkhUPYA8/edit","size":100,"imports":[]},
{"name":"docs.securedrop.org/en/stable/journalist.html","size":100,"imports":[]},
{"name":"en.support.wordpress.com/report-blogs","size":100,"imports":[]},
{"name":"en.support.wordpress.com/user-guidelines","size":100,"imports":[]},
{"name":"en.wordpress.com/abuse","size":100,"imports":[]},
{"name":"ethics.npr.org/about-npr/688418842/special-section-social-media","size":100,"imports":[]},
{"name":"evernote.com/products/webclipper","size":100,"imports":[]},
{"name":"faq.whatsapp.com/android/chats/how-to-mute-or-unmute-group-notifications","size":100,"imports":[]},
{"name":"faq.whatsapp.com/android/security-and-privacy/how-to-block-and-unblock-a-contact/?lang=en","size":100,"imports":[]},
{"name":"faq.whatsapp.com/android/status/how-to-mute-a-contacts-status-update","size":100,"imports":[]},
{"name":"faq.whatsapp.com/general/security-and-privacy/staying-safe-on-whatsapp/?lang=en","size":100,"imports":[]},
{"name":"feministfrequency.com/resources","size":100,"imports":[]},
{"name":"feministing.com/2013/04/02/howtobeagoodally","size":100,"imports":[]},
{"name":"feministing.com/community","size":100,"imports":[]},
{"name":"fortune.com/2016/07/31/bestselling-feminist-author-jessica-valenti-quits-social-media-after-rape-and-death-threats-directed-at-daughter","size":100,"imports":[]},
{"name":"fpf.training/databrokers","size":100,"imports":[]},
{"name":"gcatoolkit.org/journalists","size":100,"imports":[]},
{"name":"gendersec.tacticaltech.org/wiki/index.php/Complete_manual","size":100,"imports":[]},
{"name":"github.com/Medium/Policy/blob/master/Rules.md","size":100,"imports":[]},
{"name":"github.com/OpenInternet/MyWebsiteIsDown/blob/dev/MyWebsiteIsDown.md","size":100,"imports":[]},
{"name":"help.instagram.com/1177797265575168?helpref=search&sr=4&query=How+do+I+remove+unwanted+photos+from+my+feed%3F","size":100,"imports":[]},
{"name":"help.instagram.com/122717417885747/?helpref=hc_fnav&bc[0]=Instagram%20Help&bc[1]=Privacy%20and%20Safety%20Center&bc[2]=Report%20Something","size":100,"imports":[]},
{"name":"help.instagram.com/165828726894770/?helpref=hc_fnav&bc[0]=Instagram%20Help&bc[1]=Privacy%20and%20Safety%20Center&bc[2]=Report%20Something","size":100,"imports":[]},
{"name":"help.instagram.com/192435014247952","size":100,"imports":[]},
{"name":"help.instagram.com/196883487377501","size":100,"imports":[]},
{"name":"help.instagram.com/426700567389543","size":100,"imports":[]},
{"name":"help.instagram.com/443165679053819?helpref=page_content","size":100,"imports":[]},
{"name":"help.instagram.com/469042960409432?helpref=search&sr=9&query=How%20can%20I%20flag%20false%20information%20on%20Instagram%3F","size":100,"imports":[]},
{"name":"help.instagram.com/477434105621119","size":100,"imports":[]},
{"name":"help.instagram.com/contact/636276399721841","size":100,"imports":[]},
{"name":"help.medium.com/hc/en-us/articles/217047977-Report-posts-users","size":100,"imports":[]},
{"name":"help.medium.com/hc/en-us/articles/217048077-Block-user","size":100,"imports":[]},
{"name":"help.medium.com/hc/en-us/articles/217048127","size":100,"imports":[]},
{"name":"help.twitter.com/en/managing-your-account/understanding-the-notifications-timeline#video","size":100,"imports":[]},
{"name":"help.twitter.com/en/rules-and-policies/enforcement-options","size":100,"imports":[]},
{"name":"help.twitter.com/en/rules-and-policies#twitter-rules","size":100,"imports":[]},
{"name":"help.twitter.com/en/safety-and-security/report-abusive-behavior","size":100,"imports":[]},
{"name":"help.twitter.com/en/using-twitter/advanced-twitter-mute-options","size":100,"imports":[]},
{"name":"help.twitter.com/en/using-twitter/blocking-and-unblocking-accounts","size":100,"imports":[]},
{"name":"help.twitter.com/en/using-twitter/mentions-and-replies","size":100,"imports":[]},
{"name":"help.twitter.com/en/using-twitter/twitter-conversations","size":100,"imports":[]},
{"name":"help.twitter.com/forms","size":100,"imports":[]},
{"name":"help.twitter.com/forms/abusiveuser","size":100,"imports":[]},
{"name":"help.twitter.com/forms/impersonation","size":100,"imports":[]},
{"name":"help.yahoo.com/kb/SLN15994.html","size":100,"imports":[]},
{"name":"holistic-security.tacticaltech.org/chapters/prepare/chapter-1-1-what-is-holistic-security","size":100,"imports":[]},
{"name":"html.com/blog/doxing","size":100,"imports":[]},
{"name":"iheartmob.org","size":100,"imports":[]},
{"name":"iheartmob.org/resources/rights","size":100,"imports":[]},
{"name":"iheartmob.org/resources/self_care","size":100,"imports":[]},
{"name":"imageoptim.com/mac","size":100,"imports":[]},
{"name":"ir.lawnet.fordham.edu/cgi/viewcontent.cgi?referer=www.google.com/&httpsredir=1&article=1002&context=clip","size":100,"imports":[]},
{"name":"isapps.acxiom.com/optout/optout.aspx","size":100,"imports":[]},
{"name":"ithemes.com/purchase/backupbuddy","size":100,"imports":[]},
{"name":"jezebel.com/pregnant-woman-discovers-husband-is-vile-reddit-troll-w-1616741523","size":100,"imports":[]},
{"name":"knowyourmeme.com/memes/i-did-it-for-the-lulz","size":100,"imports":[]},
{"name":"longreads.com/2018/03/28/who-does-she-think-she-is/amp","size":100,"imports":[]},
{"name":"marc.ucla.edu/mindful-meditations","size":100,"imports":[]},
{"name":"medium.com/@DFRLab/human-bot-or-cyborg-41273cdb1e17","size":100,"imports":[]},
{"name":"medium.com/@NoraReed/hook-bait-and-camouflage-making-a-honeybot-28a9ccfe0bed","size":100,"imports":[]},
{"name":"medium.com/policy/medium-rules-30e5502c4eb4","size":100,"imports":[]},
{"name":"medium.com/policy/member-content-guidelines-e81e2e345294","size":100,"imports":[]},
{"name":"medium.economist.com/help-us-shape-the-future-of-comments-on-economist-com-fa86eeafb0ce","size":100,"imports":[]},
{"name":"mic.com/articles/168041/trolls-keep-outsmarting-anti-harassment-tools-will-twitters-new-system-actually-work#.QWYthdX2s","size":100,"imports":[]},
{"name":"mobile.va.gov/app/ptsd-coach","size":100,"imports":[]},
{"name":"monitor.firefox.com","size":100,"imports":[]},
{"name":"motherboard.vice.com/en_us/article/a3jkd4/the-reddit-moderator-getting-a-phd-in-online-moderation","size":100,"imports":[]},
{"name":"motherboard.vice.com/en_us/article/wnj9q4/gamergate-and-sjw-bots-are-battling-on-reddit","size":100,"imports":[]},
{"name":"nautil.us/issue/49/the-absurd/why-your-brain-hates-other-people","size":100,"imports":[]},
{"name":"newrepublic.com/article/147276/death-civility-digital-age","size":100,"imports":[]},
{"name":"news.stanford.edu/2017/02/06/stanford-research-shows-anyone-can-become-internet-troll","size":100,"imports":[]},
{"name":"onlinesafety.feministfrequency.com/en","size":100,"imports":[]},
{"name":"onlinesos.org/blog/i-tried-abine-delete-me-to-get-my-info-off-data-broker-websites","size":100,"imports":[]},
{"name":"onlinesos.org/resources/action-center/threat-modeling","size":100,"imports":[]},
{"name":"passwordsgenerator.net","size":100,"imports":[]},
{"name":"philome.la/jace_harr/you-feel-like-shit-an-interactive-self-care-guide/play","size":100,"imports":[]},
{"name":"privacyduck.com","size":100,"imports":[]},
{"name":"psmag.com/social-justice/women-arent-welcome-internet-72170","size":100,"imports":[]},
{"name":"psyberguide.org/?utm_source=ADAA","size":100,"imports":[]},
{"name":"qz.com/1041042/this-woman-trolls-trolls-with-cakes","size":100,"imports":[]},
{"name":"safety.google/privacy","size":100,"imports":[]},
{"name":"securityplanner.consumerreports.org","size":100,"imports":[]},
{"name":"slate.com/technology/2015/12/this-brazilian-campaign-is-putting-racist-comments-on-billboards.html","size":100,"imports":[]},
{"name":"slate.com/technology/2016/03/hamid-firoozi-used-google-dorking-to-find-vulnerability-in-new-york-dam-computer-network.html","size":100,"imports":[]},
{"name":"slate.com/technology/2020/02/how-and-why-dox-yourself.html","size":100,"imports":[]},
{"name":"splinternews.com/from-lol-to-lulz-the-evolution-of-the-internet-troll-o-1793855652","size":100,"imports":[]},
{"name":"spokeo.com","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module-categories/tool-guides","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/creating-strong-passwords","size":100,"imports":[]},
{"name":"static1.squarespace.com/static/51dc541ce4b03ebab8c5c88c/t/59ea06528dd041e0d71d8b5a/1508509266850/Sample+Documentation+Log_2014.pdf","size":100,"imports":[]},
{"name":"staysafeonline.org/blog/the-importance-of-using-a-vpn","size":100,"imports":[]},
{"name":"stream.aljazeera.com/story/201506031945-0024804","size":100,"imports":[]},
{"name":"suicidepreventionlifeline.org","size":100,"imports":[]},
{"name":"support.apple.com/en-us/HT200289","size":100,"imports":[]},
{"name":"support.apple.com/en-us/HT201361","size":100,"imports":[]},
{"name":"support.apple.com/guide/mail/use-rules-to-manage-your-inbox-mlhlp1017/mac","size":100,"imports":[]},
{"name":"support.google.com/accounts/answer/1066447?co=GENIE.Platform%3DAndroid&hl=en","size":100,"imports":[]},
{"name":"support.google.com/blogger/answer/3091837","size":100,"imports":[]},
{"name":"support.google.com/blogger/answer/76315?hl=en&authuser=0","size":100,"imports":[]},
{"name":"support.google.com/blogger/answer/82111","size":100,"imports":[]},
{"name":"support.google.com/mail/answer/6579?hl=en","size":100,"imports":[]},
{"name":"support.google.com/nexus/answer/2811098?hl=en","size":100,"imports":[]},
{"name":"support.google.com/websearch/answer/4815696?hl=en","size":100,"imports":[]},
{"name":"support.google.com/youtube/answer/2802027?hl=en","size":100,"imports":[]},
{"name":"support.google.com/youtube/answer/2802032?hl=en","size":100,"imports":[]},
{"name":"support.google.com/youtube/answer/9482361?hl=en","size":100,"imports":[]},
{"name":"support.microsoft.com/en-us/help/13776/windows-use-snipping-tool-to-capture-screenshots#take-screen-capture-print-screen=windows-8","size":100,"imports":[]},
{"name":"tacticaltech.org/pages/about-us","size":100,"imports":[]},
{"name":"talkingpointsmemo.com/cafe/let-s-be-real-online-harassment-isn-t-virtual-for-women","size":100,"imports":[]},
{"name":"time.com/4457110/internet-trolls","size":100,"imports":[]},
{"name":"time.com/4457275/twitter-blocking-troll-failure","size":100,"imports":[]},
{"name":"tumblr.zendesk.com/hc/en-us/articles/231877648-Blocking-users","size":100,"imports":[]},
{"name":"tweetdelete.net","size":100,"imports":[]},
{"name":"twitter.com/BuzzFeedNews/status/976809548936826881","size":100,"imports":[]},
{"name":"twitter.com/page88/status/937690430300442625","size":100,"imports":[]},
{"name":"twitter.com/pronounced_ing/status/676791342534651905","size":100,"imports":[]},
{"name":"twitter.com/pronounced_ing/status/797169510289670144","size":100,"imports":[]},
{"name":"twitter.com/search?src=typd&q=%23S%C4%B1rt%C4%B1m%C4%B1z%C4%B1D%C3%B6n%C3%BCyoruz","size":100,"imports":[]},
{"name":"twitter.com/settings/safety","size":100,"imports":[]},
{"name":"us.epsilon.com","size":100,"imports":[]},
{"name":"vaultpress.com","size":100,"imports":[]},
{"name":"victimsofcrime.org/our-programs/national-crime-victim-bar-association","size":100,"imports":[]},
{"name":"vlaa.org/get-help/other-vlas","size":100,"imports":[]},
{"name":"vlany.org","size":100,"imports":[]},
{"name":"whatis.techtarget.com/definition/full-disk-encryption-FDE","size":100,"imports":[]},
{"name":"whitepages.com","size":100,"imports":[]},
{"name":"whois.icann.org/en","size":100,"imports":[]},
{"name":"womeninjournalism.org/new-page-1","size":100,"imports":[]},
{"name":"wordpress.org/plugins/better-wp-security","size":100,"imports":[]},
{"name":"wordpress.org/plugins/user-blocker","size":100,"imports":[]},
{"name":"wordpress.org/plugins/wordfence","size":100,"imports":[]},
{"name":"www.7cups.com","size":100,"imports":[]},
{"name":"www.abine.com/deleteme/landing.php","size":100,"imports":[]},
{"name":"www.amazon.com/gp/help/contact-us/features-and-services.html","size":100,"imports":[]},
{"name":"www.amazon.com/gp/help/customer/display.html?nodeId=201929730","size":100,"imports":[]},
{"name":"www.americanbar.org/groups/lawyer_referral/resources/lawyer-referral-directory","size":100,"imports":[]},
{"name":"www.amnesty.org/en/latest/research/2018/03/online-violence-against-women-chapter-1/#topanchor","size":100,"imports":[]},
{"name":"www.androidcentral.com/how-take-screenshot-chromebook","size":100,"imports":[]},
{"name":"www.anywho.com/whitepages","size":100,"imports":[]},
{"name":"www.ap.org/assets/documents/social-media-guidelines_tcm28-9832.pdf","size":100,"imports":[]},
{"name":"www.apa.org/helpcenter/online-therapy.aspx","size":100,"imports":[]},
{"name":"www.authorsguild.org","size":100,"imports":[]},
{"name":"www.authorsguild.org/member-services/legal-services/writers-legal-guide","size":100,"imports":[]},
{"name":"www.bbc.com/news/technology-37728015","size":100,"imports":[]},
{"name":"www.betterhelp.com","size":100,"imports":[]},
{"name":"www.blockpartyapp.com","size":100,"imports":[]},
{"name":"www.blogger.com/content.g?hl=en&bpli=1&pli=1","size":100,"imports":[]},
{"name":"www.breakthrough.com","size":100,"imports":[]},
{"name":"www.britannica.com/topic/First-Amendment","size":100,"imports":[]},
{"name":"www.bu.edu/law/journals-archive/bulr/volume89n1/documents/CITRON.pdf","size":100,"imports":[]},
{"name":"www.businessinsider.com/experiments-show-internet-trolls-are-ordinary-people-2017-3","size":100,"imports":[]},
{"name":"www.calm.com","size":100,"imports":[]},
{"name":"www.cbsnews.com/news/internet-shaming-when-mob-justice-goes-virtual","size":100,"imports":[]},
{"name":"www.childnet.com/ufiles/Project_deSHAME_Executive_Summary.pdf","size":100,"imports":[]},
{"name":"www.cloudwards.net/dashlane-vs-1password","size":100,"imports":[]},
{"name":"www.computerworld.com/article/2849263/data-privacy/doxxing-defense-remove-your-personal-info-from-data-brokers.html","size":100,"imports":[]},
{"name":"www.consumerreports.org/personal-information/how-to-delete-your-information-from-people-search-sites","size":100,"imports":[]},
{"name":"www.crashoverridenetwork.com/index.html","size":100,"imports":[]},
{"name":"www.crashoverridenetwork.com/resources.html","size":100,"imports":[]},
{"name":"www.cybercivilrights.org","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/definitions","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/professionals-helping-victims","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/related-laws","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/revenge-porn-laws","size":100,"imports":[]},
{"name":"www.dartmouth.edu/~healthed/relax/downloads.html","size":100,"imports":[]},
{"name":"www.dashlane.com","size":100,"imports":[]},
{"name":"www.drweil.com/health-wellness/body-mind-spirit/stress-anxiety/breathing-three-exercises","size":100,"imports":[]},
{"name":"www.dylanmarron.com/podcast","size":100,"imports":[]},
{"name":"www.exifdata.com","size":100,"imports":[]},
{"name":"www.facebook.com/BindersFullofWomen","size":100,"imports":[]},
{"name":"www.facebook.com/communitystandards","size":100,"imports":[]},
{"name":"www.facebook.com/groups/WWWBMagazine","size":100,"imports":[]},
{"name":"www.facebook.com/help/1000976436606344","size":100,"imports":[]},
{"name":"www.facebook.com/help/131671940241729","size":100,"imports":[]},
{"name":"www.facebook.com/help/172936839431357","size":100,"imports":[]},
{"name":"www.facebook.com/help/190078864497547","size":100,"imports":[]},
{"name":"www.facebook.com/help/206571136073851","size":100,"imports":[]},
{"name":"www.facebook.com/help/297845860255949","size":100,"imports":[]},
{"name":"www.facebook.com/help/389645087895231","size":100,"imports":[]},
{"name":"www.facebook.com/help/408677896295618","size":100,"imports":[]},
{"name":"www.facebook.com/help/538433456491590","size":100,"imports":[]},
{"name":"www.facebook.com/help/contact/567360146613371","size":100,"imports":[]},
{"name":"www.facebook.com/help/instagram/2638385956221960","size":100,"imports":[]},
{"name":"www.facebook.com/help/messenger-app/833709093422928","size":100,"imports":[]},
{"name":"www.facebook.com/help/www/181495968648557","size":100,"imports":[]},
{"name":"www.facebook.com/settings?tab=privacy","size":100,"imports":[]},
{"name":"www.fastcompany.com/3046772/why-online-harassment-is-still-ruining-lives-and-how-we-can-stop-it","size":100,"imports":[]},
{"name":"www.fbi.gov/investigate/cyber","size":100,"imports":[]},
{"name":"www.fightcyberstalking.org/emotional-support","size":100,"imports":[]},
{"name":"www.forbes.com/sites/daniellecitron/2014/10/23/defining-online-harassment/#3aa927a028de","size":100,"imports":[]},
{"name":"www.forbes.com/sites/erikkain/2015/05/14/internet-mob-justice-isnt-justice-at-all/#4e9c932c616b","size":100,"imports":[]},
{"name":"www.fox32chicago.com/news/local/former-skinhead-forms-group-to-help-others-leave-hate-groups","size":100,"imports":[]},
{"name":"www.genderit.org/resources/zen-and-art-making-tech-work-you","size":100,"imports":[]},
{"name":"www.glbthotline.org","size":100,"imports":[]},
{"name":"www.glbthotline.org/talkline.html","size":100,"imports":[]},
{"name":"www.haltabuse.org/about/about.shtml","size":100,"imports":[]},
{"name":"www.haltabuse.org/resources/laws/index.shtml","size":100,"imports":[]},
{"name":"www.harpersbazaar.com/culture/features/a13517721/roxane-gay-hunger-interview","size":100,"imports":[]},
{"name":"www.headspace.com","size":100,"imports":[]},
{"name":"www.huffingtonpost.com/adam-levin/are-those-online-politica_b_13162006.html","size":100,"imports":[]},
{"name":"www.huffingtonpost.com/traci-l-slatton/how-to-handle-email-haras_b_5606031.html","size":100,"imports":[]},
{"name":"www.ic3.gov/complaint/default.aspx","size":100,"imports":[]},
{"name":"www.ihollaback.org","size":100,"imports":[]},
{"name":"www.ihollaback.org/bystander-resources","size":100,"imports":[]},
{"name":"www.ihollaback.org/resources/bystander-resources","size":100,"imports":[]},
{"name":"www.independent.co.uk/life-style/online-trolls-why-people-become-cyber-bullies-social-media-twitter-facebook-study-cornell-stanford-a7616126.html","size":100,"imports":[]},
{"name":"www.intelius.com","size":100,"imports":[]},
{"name":"www.iwmf.org/bjtrf","size":100,"imports":[]},
{"name":"www.iwmf.org/programs/emergency-fund","size":100,"imports":[]},
{"name":"www.lastpass.com/business-password-manager","size":100,"imports":[]},
{"name":"www.law.cornell.edu/uscode/text/18/2261A","size":100,"imports":[]},
{"name":"www.law.cornell.edu/wex/fighting_words#:~:targetText=Fighting%20words%20are%2C%20as%20first","size":100,"imports":[]},
{"name":"www.learning-theories.com/online-disinhibition-effect-suler.html","size":100,"imports":[]},
{"name":"www.lifehack.org/articles/technology/20-tips-use-google-search-efficiently.html","size":100,"imports":[]},
{"name":"www.lifewire.com/auto-filter-sender-mail-to-folder-outlook-1173804","size":100,"imports":[]},
{"name":"www.lifewire.com/what-is-blocking-on-twitter-2655403","size":100,"imports":[]},
{"name":"www.linkedin.com/help/linkedin/answer/66","size":100,"imports":[]},
{"name":"www.marieclaire.com/culture/news/a13403/online-harassment-terms-fight-back","size":100,"imports":[]},
{"name":"www.merriam-webster.com/words-at-play/clapback-meaning-origin","size":100,"imports":[]},
{"name":"www.msn.com/en-us/news/technology/analysis-why-nice-people-become-mean-online/ar-AAvoYcZ","size":100,"imports":[]},
{"name":"www.nationalreview.com/2016/10/donald-trump-alt-right-internet-abuse-never-trump-movement","size":100,"imports":[]},
{"name":"www.nbcnews.com/news/us-news/new-jersey-family-sue-school-district-after-12-year-old-n788506","size":100,"imports":[]},
{"name":"www.ncbi.nlm.nih.gov/pmc/articles/PMC3477910","size":100,"imports":[]},
{"name":"www.networksolutions.com/whois/index.jsp?bookmarked=d0c2a433ad7b00352730ae3ca1b7.059","size":100,"imports":[]},
{"name":"www.newyorker.com/magazine/2014/09/01/troll-slayer","size":100,"imports":[]},
{"name":"www.newyorker.com/magazine/2016/12/05/the-attorney-fighting-revenge-porn","size":100,"imports":[]},
{"name":"www.npr.org/2016/07/06/484987245/jewish-reporters-harassed-by-trumps-anti-semitic-supporters","size":100,"imports":[]},
{"name":"www.npr.org/sections/ed/2018/04/04/590928008/professor-harassment","size":100,"imports":[]},
{"name":"www.nytco.com/the-times-is-partnering-with-jigsaw-to-expand-comment-capabilities","size":100,"imports":[]},
{"name":"www.nytimes.com/2016/06/10/insider/why-i-quit-twitter-and-left-behind-35000-followers.html","size":100,"imports":[]},
{"name":"www.nytimes.com/2016/06/20/us/mob-shaming-the-pillory-at-the-center-of-the-global-village.html","size":100,"imports":[]},
{"name":"www.nytimes.com/2016/07/20/movies/leslie-jones-star-of-ghostbusters-becomes-a-target-of-online-trolls.html","size":100,"imports":[]},
{"name":"www.nytimes.com/2017/06/13/insider/have-a-comment-leave-a-comment.html","size":100,"imports":[]},
{"name":"www.nytimes.com/video/us/100000004467822/the-outrage-machine.html","size":100,"imports":[]},
{"name":"www.pewinternet.org/2017/07/11/experiencing-online-harassment","size":100,"imports":[]},
{"name":"www.pewinternet.org/2017/07/11/online-harassment-2017","size":100,"imports":[]},
{"name":"www.pewinternet.org/2017/07/11/witnessing-online-harassment","size":100,"imports":[]},
{"name":"www.pewresearch.org/fact-tank/2017/07/14/men-women-experience-and-view-online-harassment-differently","size":100,"imports":[]},
{"name":"www.popsci.com/protect-privacy-social-media","size":100,"imports":[]},
{"name":"www.pri.org/stories/2017-11-01/myanmar-fake-news-spread-facebook-stokes-ethnic-violence","size":100,"imports":[]},
{"name":"www.privacyduck.com","size":100,"imports":[]},
{"name":"www.propublica.org/article/facebook-hate-speech-censorship-internal-documents-algorithms","size":100,"imports":[]},
{"name":"www.psychologytoday.com/blog/nurturing-self-compassion/201703/the-psychology-hate","size":100,"imports":[]},
{"name":"www.psychologytoday.com/blog/your-online-secrets/201409/internet-trolls-are-narcissists-psychopaths-and-sadists","size":100,"imports":[]},
{"name":"www.pw.org/literary_places","size":100,"imports":[]},
{"name":"www.rainn.org/about-national-sexual-assault-telephone-hotline","size":100,"imports":[]},
{"name":"www.rainn.org/statistics/victims-sexual-violence","size":100,"imports":[]},
{"name":"www.rcfp.org/about","size":100,"imports":[]},
{"name":"www.rcfp.org/legal-hotline","size":100,"imports":[]},
{"name":"www.reputationdefender.com","size":100,"imports":[]},
{"name":"www.reuters.com/article/us-health-sleep-daylight/morning-daylight-exposure-tied-to-a-good-nights-sleep-idUSKCN18E23E","size":100,"imports":[]},
{"name":"www.sanvello.com","size":100,"imports":[]},
{"name":"www.sanvello.com/?gclid=EAIaIQobChMIlK_H7MWX5gIVC2KGCh0E8AhKEAAYASAAEgK5LPD_BwE","size":100,"imports":[]},
{"name":"www.shewrites.com","size":100,"imports":[]},
{"name":"www.simplypsychology.org/maslow.html","size":100,"imports":[]},
{"name":"www.slate.com/blogs/future_tense/2015/12/01/this_brazilian_campaign_is_putting_racist_comments_on_billboards.html","size":100,"imports":[]},
{"name":"www.snapfiles.com/get/alphascreenshot.html","size":100,"imports":[]},
{"name":"www.takebackthetech.net","size":100,"imports":[]},
{"name":"www.talkspace.com","size":100,"imports":[]},
{"name":"www.tandfonline.com/doi/full/10.1080/03637751.2015.1044256","size":100,"imports":[]},
{"name":"www.techsafety.org/appsafetycenter","size":100,"imports":[]},
{"name":"www.techsafety.org/confidentiality","size":100,"imports":[]},
{"name":"www.techsafety.org/resources-survivors","size":100,"imports":[]},
{"name":"www.techsafety.org/resources","size":100,"imports":[]},
{"name":"www.theatlantic.com/health/archive/2015/10/internet-self-care/408580","size":100,"imports":[]},
{"name":"www.theatlantic.com/technology/archive/2016/11/why-online-allies-matter-in-fighting-harassment/507722","size":100,"imports":[]},
{"name":"www.theatlantic.com/technology/archive/2018/02/who-is-weev/553295","size":100,"imports":[]},
{"name":"www.thedailybeast.com/russian-hackers-fancy-bear-targeted-hundreds-of-journalists","size":100,"imports":[]},
{"name":"www.theguardian.com/books/booksblog/2016/aug/17/womenwriters-manifesto-aims-to-build-community-of-female-authors","size":100,"imports":[]},
{"name":"www.theguardian.com/commentisfree/2016/apr/14/insults-rape-threats-writers-online-harassment","size":100,"imports":[]},
{"name":"www.theguardian.com/commentisfree/audio/2016/may/28/cyberbullying-online-harassment-jessica-valenti-podcast","size":100,"imports":[]},
{"name":"www.theguardian.com/society/2015/feb/02/what-happened-confronted-cruellest-troll-lindy-west","size":100,"imports":[]},
{"name":"www.theguardian.com/technology/series/the-web-we-want","size":100,"imports":[]},
{"name":"www.theguardian.com/us-news/2016/apr/28/julia-ioffe-journalist-melania-trump-antisemitic-abuse","size":100,"imports":[]},
{"name":"www.thehotline.org","size":100,"imports":[]},
{"name":"www.thestranger.com","size":100,"imports":[]},
{"name":"www.theverge.com/2013/4/23/4253014/swatting-911-prank-wont-stop-hackers-celebrities","size":100,"imports":[]},
{"name":"www.thisamericanlife.org/545/if-you-dont-have-anything-nice-to-say-say-it-in-all-caps","size":100,"imports":[]},
{"name":"www.thisamericanlife.org/608/transcript","size":100,"imports":[]},
{"name":"www.tineye.com","size":100,"imports":[]},
{"name":"www.translifeline.org","size":100,"imports":[]},
{"name":"www.unwomen.org/en/news/stories/2013/10/women-should-ads","size":100,"imports":[]},
{"name":"www.us-cert.gov/ncas/tips/ST04-015","size":100,"imports":[]},
{"name":"www.usatoday.com/story/tech/2017/07/12/online-harassment-rise-americans-want-tech-co-s-stop-it/469122001","size":100,"imports":[]},
{"name":"www.uscourts.gov/about-federal-courts/types-cases/civil-cases","size":100,"imports":[]},
{"name":"www.uscourts.gov/about-federal-courts/types-cases/criminal-cases","size":100,"imports":[]},
{"name":"www.vice.com/en_us/article/zm8a9y/how-to-protect-yourself-from-sim-swapping-hacks","size":100,"imports":[]},
{"name":"www.victimsofcrime.org","size":100,"imports":[]},
{"name":"www.victimsofcrime.org/our-programs/national-crime-victim-bar-association","size":100,"imports":[]},
{"name":"www.vidaweb.org","size":100,"imports":[]},
{"name":"www.washingtonpost.com/lifestyle/style/theres-no-good-way-to-deal-with-trolls-so-you-might-as-well-tattle-to-their-moms/2017/01/02/90472a24-c7d4-11e6-8bee-54e800ef2a63_story.html?utm_term=.e28f41f1e0de","size":100,"imports":[]},
{"name":"www.washingtonpost.com/news/inspired-life/wp/2018/01/08/a-man-trolled-sarah-silverman-on-twitter-she-ended-up-helping-him-with-his-medical-problems/?utm_term=.0e71a8548a3e","size":100,"imports":[]},
{"name":"www.washingtonpost.com/news/the-intersect/wp/2014/10/14/the-only-guide-to-gamergate-you-will-ever-need-to-read/?utm_term=.e34f3567693a","size":100,"imports":[]},
{"name":"www.whatsapp.com/legal/terms-of-service","size":100,"imports":[]},
{"name":"www.wikihow.com/Take-a-Screenshot-in-Linux","size":100,"imports":[]},
{"name":"www.wired.com/2014/10/content-moderation","size":100,"imports":[]},
{"name":"www.wired.com/2016/02/ive-had-a-cyberstalker-since-i-was-12","size":100,"imports":[]},
{"name":"www.wired.com/story/how-journalists-fought-back-against-crippling-email-bombs","size":100,"imports":[]},
{"name":"www.withoutmyconsent.org","size":100,"imports":[]},
{"name":"www.withoutmyconsent.org/resources/how-do-i-get-help-what-im-feeling","size":100,"imports":[]},
{"name":"www.womensmediacenter.com/speech-project/research-statistics","size":100,"imports":[]},
{"name":"www.wpbeginner.com/wp-tutorials/how-to-block-ip-addresses-in-wordpress","size":100,"imports":[]},
{"name":"www.wsj.com/articles/why-our-mental-health-takes-a-village-1516640136","size":100,"imports":[]},
{"name":"www.youtube.com/reportabuse","size":100,"imports":[]},
{"name":"www.youtube.com/watch?v=F0ZJ7QVerr0","size":100,"imports":[]},
{"name":"www.youtube.com/yt/about/policies/#community-guidelines","size":100,"imports":[]},
{"name":"www1.nyc.gov/site/doh/health/health-topics/crisis-emergency-services.page","size":100,"imports":[]},
{"name":"yandex.com/images","size":100,"imports":[]},
{"name":"yourfriends.medium.com","size":100,"imports":[]},
{"name":"zeltser.com/ddos-incident-cheat-sheet","size":100,"imports":[]},
{"name":"digitalfirstaid.org/en/index.html","size":100,"imports":["about.gitlab.com/handbook/dmca","accessnowhelpline.gitlab.io/community-documentation/166-full-disk_encryption.html","accessnowhelpline.gitlab.io/community-documentation/234-faq-online_harassment.html","accessnowhelpline.gitlab.io/community-documentation/295-password_managers.html","accessnowhelpline.gitlab.io/community-documentation/343-report_domain_impersonation_cloning.html","accessnowhelpline.gitlab.io/community-documentation/352-report_fake_domain_hosting_provider.html","account.live.com/acsr","archive.org/web","chrome.google.com/webstore/detail/nudge/dmhgdnbkjkejeddddlklojinngaideac","circl.lu/urlabuse","communitydocs.accessnow.org/182-secure_backup.html","communitydocs.accessnow.org/243-pgp_keysigning.html#comments","coping-with-prison.org","cyber-women.com/en/self-care","deflect.ca","dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide#what-is-dkim","dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide#what-is-spf","docs.blackberry.com/en/endpoint-management/blackberry-uem/12_9/blackberry-uem-self-service-user-guide/amo1375908155714","downforeveryoneorjustme.com","en.wikipedia.org/wiki/android_version_history","en.wikipedia.org/wiki/blue_screen_of_death","en.wikipedia.org/wiki/content_delivery_network","en.wikipedia.org/wiki/cross-site_scripting","en.wikipedia.org/wiki/data_recovery","en.wikipedia.org/wiki/email_spoofing","en.wikipedia.org/wiki/ios_version_history","en.wikipedia.org/wiki/macos_version_history","en.wikipedia.org/wiki/microsoft_windows","en.wikipedia.org/wiki/script_kiddie","faq.whatsapp.com/en/android/26000116/?category=5245251","femtechnet.org/csov/lock-down-your-digital-identity","github.com/botherder/snoopdigg","github.com/google/grr","github.com/openinternet/mywebsiteisdown/blob/master/mywebsiteisdown.md","github.com/te-k/how-to-quick-forensic/blob/master/windows.md","guides.accessnow.org/self-doxing.html","guides.securitywithoutborders.org/guide-to-phishing","help.github.com/en/articles/guide-to-submitting-a-dmca-takedown-notice","help.gnome.org/users/seahorse/stable/misc-key-fingerprint.html.en","help.instagram.com/149494825257596?helpref=search&","help.instagram.com/426700567389543","help.instagram.com/446663175382270","help.instagram.com/997924900322403","help.twitter.com/en/using-twitter/blocking-and-unblocking-accounts","help.twitter.com/forms/impersonation","help.twitter.com/forms/restore","help.yahoo.com/kb/account/fix-problems-signing-yahoo-account-sln2051.html?impressions=true","iheartmob.org/resources/self_care","johnopdenakker.com/securily-backup-your-data","keepassxc.org","login.yahoo.com/account/activity","mashable.com/2010/04/09/free-uptime-monitoring","medium.com/@","myaccount.google.com/device-activity","network-tools.com/nslookup","objective-see.com","objective-see.com/products/kextviewr.html","objective-see.com/products/knockknock.html","objective-see.com/products/taskexplorer.html","onlineharassmentfieldmanual.pen.org/self-care","owasp.org/www-community/attacks/xss","preyproject.com","projectshield.withgoogle.com/landing","protonmail.com/support/knowledge-base/reset-password","psiphon.ca/en/index.html","safebrowsing.google.com/safebrowsing/report_badware","securityinabox.org/en/guide/backup","securityinabox.org/en/guide/malware","securityinabox.org/en/guide/secure-file-storage","sitecheck.sucuri.net","ssd.eff.org/en/glossary/distributed-denial-service-attack","ssd.eff.org/en/module/animated-overview-using-password-managers-stay-safe-online","ssd.eff.org/en/module/creating-strong-passwords","ssd.eff.org/en/module/how-avoid-phishing-attacks","ssd.eff.org/en/module/how-use-keepassxc","ssd.eff.org/en/module/keeping-your-data-safe#1","ssd.eff.org/en/module/protecting-yourself-social-networks","sucuri.net/guides/what-is-a-ddos-attack","support.apple.com","support.apple.com/en-us/ht201081","support.apple.com/en-us/ht201252","support.apple.com/en-us/ht201314","support.apple.com/en-us/ht201355","support.apple.com/en-us/ht202860","support.apple.com/en-us/ht203977","support.apple.com/en-us/ht205064","support.apple.com/en-us/ht208682","support.apple.com/en-za/ht201250","support.apple.com/kb/ph12521?locale=en_us","support.apple.com/kb/ph2701","support.apple.com/mac-backup","support.godaddy.com/help/article/680/managing-dns-for-your-domain-names","support.google.com/accounts/answer/41078?co=genie.platform%3dandroid&","support.google.com/accounts/answer/6160491?hl=en","support.google.com/accounts/answer/6388749?co=genie.platform%3ddesktop&","support.google.com/accounts/answer/7682439?hl=en","support.google.com/android/answer/2819582?hl=en","support.google.com/legal/troubleshooter/1114905","support.google.com/plus/troubleshooter/1715140","support.google.com/webmasters/answer/6332384?hl=en#get_info_off_web","support.microsoft.com","support.microsoft.com/en-hk/help/4027408/windows-10-backup-and-restore","support.microsoft.com/en-ie/help/4028316/windows-view-hidden-files-and-folders-in-windows-10","support.microsoft.com/en-us/help/11579/microsoft-account-find-and-lock-lost-windows-device","support.microsoft.com/en-us/help/12373/windows-update-faq","support.microsoft.com/en-us/help/4000735/windows-10-reinstall","support.microsoft.com/en-us/help/4027408/windows-10-backup-and-restore","support.microsoft.com/en-us/help/4490115/windows-change-or-reset-your-password","support.wire.com/hc/en-us/articles/203526400-how-can-i-remove-someone-from-a-group-conversation-","support.wire.com/hc/en-us/articles/203526410","targetedthreats.net","tumblr.zendesk.com/hc/en-us/articles/231877648-blocking-users","tweetdeleter.com","twitter.com/settings/sessions","twofactorauth.org","urlscan.io","whois.domaintools.com","wiki.gnome.org/action/show/apps/dejadup","wiki.gnome.org/apps/dejadup/help/restore/full","withoutmyconsent.org/resources/take-down","www.accessnow.org/cms/assets/uploads/2017/09/choose-the-best-mfa-for-you.png","www.accessnow.org/need-talk-sms-based-two-step-authentication","www.amnesty.org.au/activism-self-care","www.android.com/play-protect","www.apple.com/legal/internet-services/itunes/appstorenotices/#/contacts?lang=en","www.ccleaner.com/recuva","www.cert.be/en/paper/ddos-proactive-and-reactive-measures","www.cgsecurity.org/wiki/photorec","www.cgsecurity.org/wiki/photorec_step_by_step","www.circl.lu/pub/tr-07","www.civilsphereproject.org/emergency-vpn","www.cleverfiles.com","www.cleverfiles.com/data-recovery-software.html","www.cloudflare.com/galileo","www.crowdstrike.com/blog/automating-mac-forensic-triage","www.cybercivilrights.org/online-removal/#facebook","www.cybercivilrights.org/online-removal/#google","www.cybercivilrights.org/online-removal/#instagram","www.cybercivilrights.org/online-removal/#tumblr","www.cybercivilrights.org/online-removal/#twitter","www.dedoimedo.com/computers/ubuntu-deja-dup.html","www.dropbox.com/help/files-folders/unshare-folder#remove-member","www.easeus.com/data-recovery-software","www.easeus.com/datarecoverywizard/free-data-recovery-software.htm","www.easeus.com/mac-data-recovery-software/drw-mac-free.htm","www.eff.org/deeplinks/2016/12/12-days-2fa-how-enable-two-factor-authentication-your-online-accounts","www.eff.org/deeplinks/2017/09/guide-common-types-two-factor-authentication-web","www.eff.org/issues/bloggers/legal/liability/ip","www.eff.org/keeping-your-site-alive","www.enigmail.net/index.php/en/user-manual/key-management#revoking_your_key_pair","www.facebook.com/help/174210519303259","www.facebook.com/help/211909018842184","www.facebook.com/help/290450221052800","www.facebook.com/help/contact/164405897002583","www.facebook.com/login/identify","www.facebook.com/settings?tab=security","www.fightcyberstalking.org/emotional-support","www.frontlinedefenders.org/en/resource-publication/guide-secure-group-chat-and-conferencing-tools","www.gnupg.org/gph/en/manual/x135.html","www.google.com/webmasters/tools/legal-removal-request?complaint_type=rtbf&","www.howtogeek.com/248127/how-to-wipe-your-android-device-and-restore-it-to-factory-settings","www.hrresilience.org","www.icloud.com/#find","www.macworld.co.uk/how-to/mac-software/show-hidden-files-mac-3520878","www.maketecheasier.com/read-email-in-plain-text","www.networksolutions.com/support/how-to-manage-advanced-dns-records","www.newtactics.org/conversation/self-care-activists-sustaining-your-most-valuable-resource","www.newtactics.org/search/solr/arrest","www.nomoreransom.org","www.nytimes.com/2018/07/05/technology/personaltech/windows-10-timeline.html","www.nytimes.com/2018/08/01/technology/personaltech/mac-find-lost-files.html","www.patreon.com/posts/12240673","www.takebackthetech.net/be-safe/hate-speech-strategies","www.technologyhint.com/show-hidden-files","www.techsafety.org/documentationtips","www.techsafety.org/documentationtips","www.threatcrowd.org","www.torproject.org/projects/gettor.html","www.virustotal.com","www.whoishostingthis.com","www.wired.com/story/how-to-back-up-your-digital-life"]},
{"name":"about.gitlab.com/handbook/dmca","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/166-full-disk_encryption.html","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/234-faq-online_harassment.html","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/295-password_managers.html","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/343-report_domain_impersonation_cloning.html","size":100,"imports":[]},
{"name":"accessnowhelpline.gitlab.io/community-documentation/352-report_fake_domain_hosting_provider.html","size":100,"imports":[]},
{"name":"account.live.com/acsr","size":100,"imports":[]},
{"name":"archive.org/web","size":100,"imports":[]},
{"name":"chrome.google.com/webstore/detail/nudge/dmhgdnbkjkejeddddlklojinngaideac","size":100,"imports":[]},
{"name":"circl.lu/urlabuse","size":100,"imports":[]},
{"name":"communitydocs.accessnow.org/182-secure_backup.html","size":100,"imports":[]},
{"name":"communitydocs.accessnow.org/243-pgp_keysigning.html#comments","size":100,"imports":[]},
{"name":"coping-with-prison.org","size":100,"imports":[]},
{"name":"cyber-women.com/en/self-care","size":100,"imports":[]},
{"name":"deflect.ca","size":100,"imports":[]},
{"name":"dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide#what-is-dkim","size":100,"imports":[]},
{"name":"dmarcly.com/blog/how-to-implement-dmarc-dkim-spf-to-stop-email-spoofing-phishing-the-definitive-guide#what-is-spf","size":100,"imports":[]},
{"name":"docs.blackberry.com/en/endpoint-management/blackberry-uem/12_9/blackberry-uem-self-service-user-guide/amo1375908155714","size":100,"imports":[]},
{"name":"downforeveryoneorjustme.com","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/android_version_history","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/blue_screen_of_death","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/content_delivery_network","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/cross-site_scripting","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/data_recovery","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/email_spoofing","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/ios_version_history","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/macos_version_history","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/microsoft_windows","size":100,"imports":[]},
{"name":"en.wikipedia.org/wiki/script_kiddie","size":100,"imports":[]},
{"name":"faq.whatsapp.com/en/android/26000116/?category=5245251","size":100,"imports":[]},
{"name":"femtechnet.org/csov/lock-down-your-digital-identity","size":100,"imports":[]},
{"name":"github.com/botherder/snoopdigg","size":100,"imports":[]},
{"name":"github.com/google/grr","size":100,"imports":[]},
{"name":"github.com/openinternet/mywebsiteisdown/blob/master/mywebsiteisdown.md","size":100,"imports":[]},
{"name":"github.com/te-k/how-to-quick-forensic/blob/master/windows.md","size":100,"imports":[]},
{"name":"guides.accessnow.org/self-doxing.html","size":100,"imports":[]},
{"name":"guides.securitywithoutborders.org/guide-to-phishing","size":100,"imports":[]},
{"name":"help.github.com/en/articles/guide-to-submitting-a-dmca-takedown-notice","size":100,"imports":[]},
{"name":"help.gnome.org/users/seahorse/stable/misc-key-fingerprint.html.en","size":100,"imports":[]},
{"name":"help.instagram.com/149494825257596?helpref=search&","size":100,"imports":[]},
{"name":"help.instagram.com/446663175382270","size":100,"imports":[]},
{"name":"help.instagram.com/997924900322403","size":100,"imports":[]},
{"name":"help.twitter.com/forms/restore","size":100,"imports":[]},
{"name":"help.yahoo.com/kb/account/fix-problems-signing-yahoo-account-sln2051.html?impressions=true","size":100,"imports":[]},
{"name":"johnopdenakker.com/securily-backup-your-data","size":100,"imports":[]},
{"name":"login.yahoo.com/account/activity","size":100,"imports":[]},
{"name":"mashable.com/2010/04/09/free-uptime-monitoring","size":100,"imports":[]},
{"name":"medium.com/@","size":100,"imports":[]},
{"name":"myaccount.google.com/device-activity","size":100,"imports":[]},
{"name":"network-tools.com/nslookup","size":100,"imports":[]},
{"name":"objective-see.com","size":100,"imports":[]},
{"name":"objective-see.com/products/kextviewr.html","size":100,"imports":[]},
{"name":"objective-see.com/products/knockknock.html","size":100,"imports":[]},
{"name":"objective-see.com/products/taskexplorer.html","size":100,"imports":[]},
{"name":"onlineharassmentfieldmanual.pen.org/self-care","size":100,"imports":[]},
{"name":"owasp.org/www-community/attacks/xss","size":100,"imports":[]},
{"name":"preyproject.com","size":100,"imports":[]},
{"name":"projectshield.withgoogle.com/landing","size":100,"imports":[]},
{"name":"protonmail.com/support/knowledge-base/reset-password","size":100,"imports":[]},
{"name":"psiphon.ca/en/index.html","size":100,"imports":[]},
{"name":"safebrowsing.google.com/safebrowsing/report_badware","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/backup","size":100,"imports":[]},
{"name":"securityinabox.org/en/guide/secure-file-storage","size":100,"imports":[]},
{"name":"sitecheck.sucuri.net","size":100,"imports":[]},
{"name":"ssd.eff.org/en/glossary/distributed-denial-service-attack","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/animated-overview-using-password-managers-stay-safe-online","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/how-use-keepassxc","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/keeping-your-data-safe#1","size":100,"imports":[]},
{"name":"ssd.eff.org/en/module/protecting-yourself-social-networks","size":100,"imports":[]},
{"name":"sucuri.net/guides/what-is-a-ddos-attack","size":100,"imports":[]},
{"name":"support.apple.com","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht201081","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht201252","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht201314","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht201355","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht202860","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht203977","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht205064","size":100,"imports":[]},
{"name":"support.apple.com/en-us/ht208682","size":100,"imports":[]},
{"name":"support.apple.com/en-za/ht201250","size":100,"imports":[]},
{"name":"support.apple.com/kb/ph12521?locale=en_us","size":100,"imports":[]},
{"name":"support.apple.com/kb/ph2701","size":100,"imports":[]},
{"name":"support.apple.com/mac-backup","size":100,"imports":[]},
{"name":"support.godaddy.com/help/article/680/managing-dns-for-your-domain-names","size":100,"imports":[]},
{"name":"support.google.com/accounts/answer/41078?co=genie.platform%3dandroid&","size":100,"imports":[]},
{"name":"support.google.com/accounts/answer/6388749?co=genie.platform%3ddesktop&","size":100,"imports":[]},
{"name":"support.google.com/accounts/answer/7682439?hl=en","size":100,"imports":[]},
{"name":"support.google.com/android/answer/2819582?hl=en","size":100,"imports":[]},
{"name":"support.google.com/legal/troubleshooter/1114905","size":100,"imports":[]},
{"name":"support.google.com/plus/troubleshooter/1715140","size":100,"imports":[]},
{"name":"support.google.com/webmasters/answer/6332384?hl=en#get_info_off_web","size":100,"imports":[]},
{"name":"support.microsoft.com","size":100,"imports":[]},
{"name":"support.microsoft.com/en-hk/help/4027408/windows-10-backup-and-restore","size":100,"imports":[]},
{"name":"support.microsoft.com/en-ie/help/4028316/windows-view-hidden-files-and-folders-in-windows-10","size":100,"imports":[]},
{"name":"support.microsoft.com/en-us/help/11579/microsoft-account-find-and-lock-lost-windows-device","size":100,"imports":[]},
{"name":"support.microsoft.com/en-us/help/12373/windows-update-faq","size":100,"imports":[]},
{"name":"support.microsoft.com/en-us/help/4000735/windows-10-reinstall","size":100,"imports":[]},
{"name":"support.microsoft.com/en-us/help/4027408/windows-10-backup-and-restore","size":100,"imports":[]},
{"name":"support.microsoft.com/en-us/help/4490115/windows-change-or-reset-your-password","size":100,"imports":[]},
{"name":"support.wire.com/hc/en-us/articles/203526400-how-can-i-remove-someone-from-a-group-conversation-","size":100,"imports":[]},
{"name":"support.wire.com/hc/en-us/articles/203526410","size":100,"imports":[]},
{"name":"targetedthreats.net","size":100,"imports":[]},
{"name":"tumblr.zendesk.com/hc/en-us/articles/231877648-blocking-users","size":100,"imports":[]},
{"name":"tweetdeleter.com","size":100,"imports":[]},
{"name":"twitter.com/settings/sessions","size":100,"imports":[]},
{"name":"urlscan.io","size":100,"imports":[]},
{"name":"whois.domaintools.com","size":100,"imports":[]},
{"name":"wiki.gnome.org/action/show/apps/dejadup","size":100,"imports":[]},
{"name":"wiki.gnome.org/apps/dejadup/help/restore/full","size":100,"imports":[]},
{"name":"withoutmyconsent.org/resources/take-down","size":100,"imports":[]},
{"name":"www.accessnow.org/cms/assets/uploads/2017/09/choose-the-best-mfa-for-you.png","size":100,"imports":[]},
{"name":"www.accessnow.org/need-talk-sms-based-two-step-authentication","size":100,"imports":[]},
{"name":"www.amnesty.org.au/activism-self-care","size":100,"imports":[]},
{"name":"www.android.com/play-protect","size":100,"imports":[]},
{"name":"www.apple.com/legal/internet-services/itunes/appstorenotices/#/contacts?lang=en","size":100,"imports":[]},
{"name":"www.ccleaner.com/recuva","size":100,"imports":[]},
{"name":"www.cert.be/en/paper/ddos-proactive-and-reactive-measures","size":100,"imports":[]},
{"name":"www.cgsecurity.org/wiki/photorec","size":100,"imports":[]},
{"name":"www.cgsecurity.org/wiki/photorec_step_by_step","size":100,"imports":[]},
{"name":"www.circl.lu/pub/tr-07","size":100,"imports":[]},
{"name":"www.civilsphereproject.org/emergency-vpn","size":100,"imports":[]},
{"name":"www.cleverfiles.com","size":100,"imports":[]},
{"name":"www.cleverfiles.com/data-recovery-software.html","size":100,"imports":[]},
{"name":"www.cloudflare.com/galileo","size":100,"imports":[]},
{"name":"www.crowdstrike.com/blog/automating-mac-forensic-triage","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/online-removal/#facebook","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/online-removal/#google","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/online-removal/#instagram","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/online-removal/#tumblr","size":100,"imports":[]},
{"name":"www.cybercivilrights.org/online-removal/#twitter","size":100,"imports":[]},
{"name":"www.dedoimedo.com/computers/ubuntu-deja-dup.html","size":100,"imports":[]},
{"name":"www.dropbox.com/help/files-folders/unshare-folder#remove-member","size":100,"imports":[]},
{"name":"www.easeus.com/data-recovery-software","size":100,"imports":[]},
{"name":"www.easeus.com/datarecoverywizard/free-data-recovery-software.htm","size":100,"imports":[]},
{"name":"www.easeus.com/mac-data-recovery-software/drw-mac-free.htm","size":100,"imports":[]},
{"name":"www.eff.org/deeplinks/2017/09/guide-common-types-two-factor-authentication-web","size":100,"imports":[]},
{"name":"www.eff.org/issues/bloggers/legal/liability/ip","size":100,"imports":[]},
{"name":"www.eff.org/keeping-your-site-alive","size":100,"imports":[]},
{"name":"www.enigmail.net/index.php/en/user-manual/key-management#revoking_your_key_pair","size":100,"imports":[]},
{"name":"www.facebook.com/help/174210519303259","size":100,"imports":[]},
{"name":"www.facebook.com/help/211909018842184","size":100,"imports":[]},
{"name":"www.facebook.com/help/290450221052800","size":100,"imports":[]},
{"name":"www.facebook.com/help/contact/164405897002583","size":100,"imports":[]},
{"name":"www.facebook.com/login/identify","size":100,"imports":[]},
{"name":"www.facebook.com/settings?tab=security","size":100,"imports":[]},
{"name":"www.frontlinedefenders.org/en/resource-publication/guide-secure-group-chat-and-conferencing-tools","size":100,"imports":[]},
{"name":"www.gnupg.org/gph/en/manual/x135.html","size":100,"imports":[]},
{"name":"www.google.com/webmasters/tools/legal-removal-request?complaint_type=rtbf&","size":100,"imports":[]},
{"name":"www.howtogeek.com/248127/how-to-wipe-your-android-device-and-restore-it-to-factory-settings","size":100,"imports":[]},
{"name":"www.hrresilience.org","size":100,"imports":[]},
{"name":"www.icloud.com/#find","size":100,"imports":[]},
{"name":"www.macworld.co.uk/how-to/mac-software/show-hidden-files-mac-3520878","size":100,"imports":[]},
{"name":"www.maketecheasier.com/read-email-in-plain-text","size":100,"imports":[]},
{"name":"www.networksolutions.com/support/how-to-manage-advanced-dns-records","size":100,"imports":[]},
{"name":"www.newtactics.org/conversation/self-care-activists-sustaining-your-most-valuable-resource","size":100,"imports":[]},
{"name":"www.newtactics.org/search/solr/arrest","size":100,"imports":[]},
{"name":"www.nomoreransom.org","size":100,"imports":[]},
{"name":"www.nytimes.com/2018/07/05/technology/personaltech/windows-10-timeline.html","size":100,"imports":[]},
{"name":"www.nytimes.com/2018/08/01/technology/personaltech/mac-find-lost-files.html","size":100,"imports":[]},
{"name":"www.patreon.com/posts/12240673","size":100,"imports":[]},
{"name":"www.takebackthetech.net/be-safe/hate-speech-strategies","size":100,"imports":[]},
{"name":"www.technologyhint.com/show-hidden-files","size":100,"imports":[]},
{"name":"www.techsafety.org/documentationtips","size":100,"imports":[]},
{"name":"www.threatcrowd.org","size":100,"imports":[]},
{"name":"www.torproject.org/projects/gettor.html","size":100,"imports":[]},
{"name":"www.virustotal.com","size":100,"imports":[]},
{"name":"www.whoishostingthis.com","size":100,"imports":[]},
{"name":"www.wired.com/story/how-to-back-up-your-digital-life","size":100,"imports":[]},
{"name":"securityplanner.consumerreports.org/recommendations","size":100,"imports":["1password.com","2019.www.torproject.org/docs/faq.html.en#tbbsocksport","accessmyinfo.org","account.microsoft.com/account/privacy","addons.mozilla.org/en-us/firefox/addon/disconnect","addons.mozilla.org/en-us/firefox/addon/ublock-origin","archive.org/embed/using-password-managers-to-stay-safe-online","authy.com","bitwarden.com","brave.com","chrome.google.com/webstore/detail/disconnect/jeoacafpbcihiomhlakheieifhpjdfeo","chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en","digital-lab-wp.consumerreports.org/wp-content/uploads/2020/05/understanding-the-scope-of-data-collection-by-major-platforms_2020_final.pdf","en-americas-support.nintendo.com/app/answers/detail/a_id/27496","encrypt.me","freedom.press/training/-depth-guide-choosing-web-browser","freedom.press/training/choosing-a-vpn","freedom.press/training/email-security-tips","freedom.press/training/your-smartphone-and-you-handbook-modern-mobile-maintenance","gameshotline.org","github.com/firstlookmedia/dangerzone","github.com/narwhalacademy/zebra-crossing","github.com/yaelwrites/big-ass-data-broker-opt-out-list","help.dropbox.com/teams-admins/team-member/enable-two-step-verification#securitykey","help.ea.com/en-us/help/account/origin-login-verification-information","help.instagram.com/196883487377501","help.instagram.com/368191326593075","help.twitter.com/en/managing-your-account/two-factor-authentication","help.twitter.com/en/safety-and-security","help.twitter.com/en/safety-and-security/twitter-account-hacked","help.twitter.com/en/safety-and-security#ads-and-data-privacy","iheartmob.org/resources","itunes.apple.com/us/app/signal-private-messenger/id874139669?mt=8","iverify.trailofbits.com","lifehacker.com/why-you-should-use-windows-defenders-ransomware-prevent-1837311176","medium.com/@mshelton/signal-for-beginners-c6b44f76a1f0","mullvad.net/en","myaccount.google.com/privacycheckup","myaccount.google.com/secureaccount","myvpostpay.verizon.com/ui/acct/secure/profile/security/portsecurity","oag.ca.gov/data-brokers","onionbrowser.com","onlineharassmentfieldmanual.pen.org","onlinesos.org/action-center","phishingquiz.withgoogle.com","play.google.com/store/apps/details?id=org.thoughtcrime.securesms&","safe.page/quiz","safeandsecure.film","safeandsecure.film/introduction","safeescape.org","safety.google/privacy/privacy-controls","signal.org/download","spideroak.com/one","ssd.eff.org/en","ssd.eff.org/en/module/choosing-vpn-thats-right-you","ssd.eff.org/en/module/how-avoid-phishing-attacks","ssd.eff.org/en/module/how-use-signal-android","ssd.eff.org/en/module/how-use-signal-ios","ssd.eff.org/en/module/how-use-whatsapp-android","ssd.eff.org/en/module/how-use-whatsapp-ios","ssd.eff.org/en/module/protecting-yourself-social-networks","stopstalkerware.org","stopstalkerware.org/get-help/resources","support.1password.com/security-key","support.apple.com/en-au/ht201642","support.apple.com/en-ca/ht201250","support.apple.com/en-ca/ht201365","support.apple.com/en-ca/ht201472","support.apple.com/en-ca/ht203977","support.apple.com/en-ca/ht204136","support.apple.com/en-ca/ht204247#backups","support.apple.com/en-ca/ht210400","support.apple.com/en-ca/ht210515","support.apple.com/en-gb/ht201529","support.apple.com/en-us/ht201210","support.apple.com/en-us/ht201250","support.apple.com/en-us/ht201954","support.apple.com/en-us/ht202180","support.apple.com/en-us/ht203033","support.apple.com/en-us/ht203097","support.apple.com/en-us/ht203981","support.apple.com/en-us/ht204060","support.apple.com/en-us/ht204145","support.apple.com/en-us/ht204215","support.apple.com/en-us/ht204837","support.apple.com/en-us/ht204915","support.apple.com/en-us/ht205220","support.apple.com/en-us/ht207056","support.apple.com/en-us/ht210657","support.apple.com/guide/iphone/change-app-access-to-information-iph251e92810/ios","support.apple.com/guide/mac-help/change-software-update-preferences-on-mac-mchla7037245/10.15/mac/10.15","support.apple.com/guide/mac-help/get-macos-updates-mchlpx1065/mac","support.apple.com/guide/mac-help/keep-your-time-machine-backup-disk-secure-mh21241/mac","support.apple.com/guide/safari/privacy-sfri35610/mac","support.gog.com/hc/en-us/articles/115003660533?product=gog","support.google.com/accounts/answer/1066447?co=genie.platform%3dandroid&","support.google.com/accounts/answer/2812853?hl=en","support.google.com/accounts/answer/3265955?hl=en","support.google.com/accounts/answer/6103523?co=genie.platform%3dandroid&","support.google.com/accounts/answer/6160491?hl=en","support.google.com/accounts/answer/6294825?hl=en","support.google.com/android/answer/2819582?hl=en","support.google.com/android/answer/3094742","support.google.com/android/answer/7431795","support.google.com/android/answer/7680439?hl=en","support.google.com/android/answer/9079129?hl=en","support.google.com/android/answer/9459346?visit_id=637154243452489279-2689891282&","support.google.com/assistant/answer/7108295?hl=en&","support.google.com/assistant/answer/7126196?hl=en","support.google.com/assistant/answer/9039879?hl=en&","support.google.com/googleplay/answer/6014972","support.google.com/googleplay/answer/6270602?hl=en","support.google.com/photos/answer/6193313?co=genie.platform%3dandroid&","support.microsoft.com/en-ca/help/4013263/windows-10-stay-protected-with-windows-security","support.microsoft.com/en-ca/help/4026181/windows-10-find-my-bitlocker-recovery-key","support.microsoft.com/en-ca/help/4027408/windows-10-backup-and-restore","support.microsoft.com/en-ca/help/4028544/windows-10-turn-windows-defender-firewall-on-or-off","support.microsoft.com/en-us/help/12373/windows-update-faq","support.microsoft.com/en-us/help/12408/microsoft-account-how-to-use-two-step-verification","support.microsoft.com/en-us/help/15081/windows-turn-on-automatic-app-updates","support.microsoft.com/en-us/help/17085/windows-8-restore-refresh-reset-pc","support.microsoft.com/en-us/help/17127/windows-back-up-restore","support.microsoft.com/en-us/help/4028713/windows-10-turn-on-device-encryption","support.microsoft.com/en-us/help/4502379/windows-10-device-encryption","support.microsoft.com/en-us/help/4525108/security-risks-of-allowing-apps-through-windows-defender-firewall","support.snapchat.com/en-us/a/privacy-settings","support.steampowered.com/kb_article.php?ref=4020-alzm-5519","support.tiktok.com/en/privacy-safety/comment-duet-and-direct-message-control-default","support.ubisoft.com/en-us/faqs/000025170","tallpoppy.com","thewirecutter.com/reviews/how-to-back-up-your-computer","twofactorauth.org","twofactorauth.org/#gaming","us.battle.net/support/en/article/24520","wccftech.com/how-to/how-to-enable-ransomware-protection-on-windows-10","www.accessnow.org/help","www.accessnow.org/transparency-reporting-index","www.amazon.com/gp/help/customer/display.html?nodeid=201962420","www.amazon.com/gp/help/customer/display.html?nodeid=gpgryrz494gdfpz2","www.androidauthority.com/android-10-privacy-features-1025443","www.annualcreditreport.com/index.action","www.apple.com/privacy/manage-your-privacy","www.att.com/myatt/lgn/resources/auth/login/haloc/goto-login","www.av-comparatives.org/wp-content/uploads/2020/06/avc_stalkerware_2020.pdf","www.backblaze.com","www.cnet.com/how-to/sim-swap-fraud-what-it-is-why-you-should-care-and-how-to-prevent-it","www.computerworld.com/article/3215095/how-to-back-up-android-phones-complete-guide.html","www.consumer.ftc.gov/articles/0042-online-tracking","www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams","www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams#report","www.consumer.ftc.gov/blog/2019/10/sim-swap-scams-how-protect-yourself","www.consumer.ftc.gov/topics/identity-theft","www.crisistextline.org","www.cybercivilrights.org","www.cybercivilrights.org/ccri-crisis-helpline","www.cybercivilrights.org/online-removal","www.dataprotection.ie/en/individuals/know-your-rights/right-access-information","www.digitaldefenders.org/digitalfirstaid","www.dignited.com/31010/set-up-a-sim-card-lock-on-android","www.eff.org/deeplinks/2018/03/thinking-about-what-you-need-secure-messenger","www.eff.org/encrypt-the-web","www.eff.org/https-everywhere","www.eff.org/pages/tor-and-https","www.eff.org/privacybadger","www.eff.org/privacybadger/faq","www.eff.org/wp/who-has-your-back-2019","www.epicgames.com/help/en-us/epic-accounts-c74/account-security-c112/twofactor-authentication-and-how-to-enable-it-a3218","www.equifax.com","www.experian.com","www.facebook.com/help/1306725409382822","www.facebook.com/help/401566786855239","www.facebook.com/help/443357099140264","www.facebook.com/privacy/checkup/?source=settings_and_privacy","www.google.com/chrome/browser","www.google.com/intl/en-us/landing/2step/features.html","www.identitytheft.gov","www.identitytheft.gov","www.idtheftcenter.org","www.internetmatters.org/parental-controls/social-media-guides-parents/#1502118189543-b5aceb4f-2cc2","www.ivpn.net","www.keepersecurity.com","www.laptopmag.com/how-to/heres-the-easiest-way-to-protect-your-gaming-accounts-xbox-live-nintendo-steam-and-more","www.linkedin.com/help/linkedin/answer/56363/reporting-a-hacked-account?lang=en","www.linkedin.com/help/linkedin/answer/66/managing-your-account-and-privacy-settings-overview?lang=en","www.maketecheasier.com/ultimate-ublock-origin-superusers-guide","www.microsoft.com/en-us/account/authenticator","www.mozilla.org/en-us/firefox","www.nctue.com","www.nytimes.com/wirecutter/reviews/best-security-keys","www.nytimes.com/wirecutter/reviews/best-vpn-service","www.playstation.com/en-us/account-security/2-step-verification","www.ted.com/talks/eva_galperin_what_you_need_to_know_about_stalkerware?language=en","www.theverge.com/2017/6/17/15772142/how-to-set-up-two-factor-authentication","www.theverge.com/interface/2019/11/14/20963124/facebook-transparency-report-limits-justice-oversight-board","www.torproject.org","www.torproject.org/about/overview.html.en","www.transunion.com","www.tunnelbear.com","www.verizon.com/privacy/your-data","www.virustotal.com","www.whatsapp.com/download","www.which.co.uk/consumer-rights/advice/how-to-spot-a-fake-fraudulent-or-scam-website","www.wired.com/story/chrome-firefox-edge-browser-privacy","www.youtube.com/watch?v=jwii85ulzkw","www.yubico.com/setup","www.yubico.com/store"]},
{"name":"2019.www.torproject.org/docs/faq.html.en#tbbsocksport","size":100,"imports":[]},
{"name":"accessmyinfo.org","size":100,"imports":[]},
{"name":"account.microsoft.com/account/privacy","size":100,"imports":[]},
{"name":"addons.mozilla.org/en-us/firefox/addon/disconnect","size":100,"imports":[]},
{"name":"addons.mozilla.org/en-us/firefox/addon/ublock-origin","size":100,"imports":[]},
{"name":"archive.org/embed/using-password-managers-to-stay-safe-online","size":100,"imports":[]},
{"name":"bitwarden.com","size":100,"imports":[]},
{"name":"brave.com","size":100,"imports":[]},
{"name":"chrome.google.com/webstore/detail/disconnect/jeoacafpbcihiomhlakheieifhpjdfeo","size":100,"imports":[]},
{"name":"chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm?hl=en","size":100,"imports":[]},
{"name":"digital-lab-wp.consumerreports.org/wp-content/uploads/2020/05/understanding-the-scope-of-data-collection-by-major-platforms_2020_final.pdf","size":100,"imports":[]},
{"name":"en-americas-support.nintendo.com/app/answers/detail/a_id/27496","size":100,"imports":[]},
{"name":"encrypt.me","size":100,"imports":[]},
{"name":"freedom.press/training/-depth-guide-choosing-web-browser","size":100,"imports":[]},
{"name":"freedom.press/training/your-smartphone-and-you-handbook-modern-mobile-maintenance","size":100,"imports":[]},
{"name":"gameshotline.org","size":100,"imports":[]},
{"name":"github.com/firstlookmedia/dangerzone","size":100,"imports":[]},
{"name":"github.com/narwhalacademy/zebra-crossing","size":100,"imports":[]},
{"name":"github.com/yaelwrites/big-ass-data-broker-opt-out-list","size":100,"imports":[]},
{"name":"help.dropbox.com/teams-admins/team-member/enable-two-step-verification#securitykey","size":100,"imports":[]},
{"name":"help.ea.com/en-us/help/account/origin-login-verification-information","size":100,"imports":[]},
{"name":"help.instagram.com/368191326593075","size":100,"imports":[]},
{"name":"help.twitter.com/en/managing-your-account/two-factor-authentication","size":100,"imports":[]},
{"name":"help.twitter.com/en/safety-and-security","size":100,"imports":[]},
{"name":"help.twitter.com/en/safety-and-security/twitter-account-hacked","size":100,"imports":[]},
{"name":"help.twitter.com/en/safety-and-security#ads-and-data-privacy","size":100,"imports":[]},
{"name":"iheartmob.org/resources","size":100,"imports":[]},
{"name":"itunes.apple.com/us/app/signal-private-messenger/id874139669?mt=8","size":100,"imports":[]},
{"name":"iverify.trailofbits.com","size":100,"imports":[]},
{"name":"lifehacker.com/why-you-should-use-windows-defenders-ransomware-prevent-1837311176","size":100,"imports":[]},
{"name":"mullvad.net/en","size":100,"imports":[]},
{"name":"myaccount.google.com/privacycheckup","size":100,"imports":[]},
{"name":"myaccount.google.com/secureaccount","size":100,"imports":[]},
{"name":"myvpostpay.verizon.com/ui/acct/secure/profile/security/portsecurity","size":100,"imports":[]},